Personal Information
Organization / Workplace
Germany Germany
Occupation
SOC & CSIRT Architect & Consultant | SIEM engineer | Threat Intelligence Expert | Author & Instructor
Industry
Technology / Software / Internet
Website
About
Over 10 years of professional experience
Cyber Security Expert
Rich Consultancy & operation experience
Currently working as senior on SOC & IR
Authors of Threat Intelligence for Hunting & Next Generation SOC
Authoring Threat Intelligence & Security Operation Center & Threat Hunting Courses
Instructor for many official courses including EC-council, CompTIA, ISACA
Contact Details
Tags
soc
reza adineh
siem
threat detection
threat intelligence
log management
mitre
mitre att&ck
threat hunting
security log management
security operation centers
cti
security information & event management
soc maturity model
event management
correlation
cyber threats
advanced persistence threat solution
information security
ebook
event & log
log monitoring
threat management
rezaadineh
dibagaran
adineh
惺惠 悋擧悋 惡愕悋惘 悋慍 拆惘 悋 惘擧慍惺悋惠 悋惠
the journey of an event in elastic
拆惘 悋 惘擧慍惺悋惠 悋惠
惘擧慍 惺悋惠 悋惠
modern log parsing
parser
cyber security management
visualize log
implement elastic
elastic architecture
security
security incident & event management
event id
log
incident management
apt
security breaches
cyber attack
vulnerability management
aggregation
kibana
elastic
logstash
opensource log management
log stracture
log indexing vs regex
log indexing vs regular expressions
books
next generation security operation center
edr
uba
csirt
threat intell
nextgen soc
publish
social media
sim
book
feedibo
digikala
intelligence
ioc
ioa
security incident & event mana
security operation center
intro with mitre att&ck
cyber threat intelligence
successful soc
mature soc
惘擧慍 惺悋惠 悋惠
惘惷悋 悛惆
resume
personal profile
user behavior analytic
event correlation
correlation types
correlation approach
correlation considerations
event
event masking
data mining
events correlation definition
event aggregation
siem event correlation
event filtering
steps in event correlation
root cause analysis
cyber defense
See more
- Presentations
- Documents
- Infographics