SECURITY ENGINEERING & ARCHITECTURE 

Netneering














Key Attributes:

Incident Response

Netneering can assist on a case-by-case bases with any security events which may arise in your organization.  From cyber threats originating  outside your environment to Insider threats originating from employees themselves, we can take you through the five step process for resolution and awareness.



Purpose:  Investigation of anomalous activities to determine root cause and possible intent.


Item
Work Streams
Description
1
Discovery
 Collection of pertinent information to understand the nature, impact, and scope of the incident.
2

Containment

Establish was to contain the problem while have the least amount of impact on business operations.
3
Remediation
 Remove  the threat, and implement any controls to prevent it from reoccurring in the future.
4
Recovery
Return operations to is normal functioning state.
5
Lessons Learned
Reflect on the incident and provide awareness where needed.


  • Evidence collection is systematic and meet the proper evidentiary  standards and procedures.
  • Integration and collaboration with existing  response teams.
  • Excellent problem solving, critical thinking, and analytical skills
  • Ability to conducts forensics on a variety of different layers ( i.e. Application, System, Network, and Physical)
  • Deep knowledge of diverse operating systems, networking protocols, and systems administration
  • Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs