Threat Hunter
Cyber
- Conduct proactive threat-hunting investigations, identifying % of previously undetected threats
- Develop custom threat detection rules in SIEM and EDR tools, improving detection accuracy by %
- Perform malware analysis and forensic investigations to identify TTPs (Tactics, Techniques, Procedures)
- Collaborate with incident response teams to mitigate security breaches and prevent future attacks
- Research and analyze APT groups and emerging threats to enhance cyber defense strategies
- Exceeded target by [Number]% by setting and checking over [Number] [Type] traps.
- Increased fishing efficiency by [Number]% through dedicated monitoring of fish behavior and habitats.
- Harvested as many as [Number] pounds per trip to sell at markets and local restaurants.
- Supervised [Number] fisherman on [Number] foot vessel to optimize performance and safety standards while fishing.
- Collected [Type] and [Type] fish and sold [Number] pounds per day to local restaurants and fish markets.
- Exceeded target by [Number]% by setting and checking over [Number] [Type] traps.
- Exceeded target by [Number]% by setting and checking over [Number] [Type] traps.