Soc Analyst
Soc Analyst
Dear Intern,
We're thrilled to have you on board for this exciting cybersecurity internship
program at CFSS! Here are some important details about your project:
Project Confidentiality: Please remember that the project provided is confidential. Do not
share it with anyone outside of CFSS.
Evaluation Process: Your answers won't be marked by a specific scale. Our task checker will
assess your explanations comprehensively.
Project Submission: Ensure your personally curated project reaches us by December 13th in
PDF format. The submission form will open on December 15th.
Scoring System: A total of 100 points are available. To achieve certification, strive for a
minimum of 75 points. Aim for excellence and attempt as many questions as possible to secure
a spot in the top 30.
CTF Accounts: If your project includes CTF challenges, kindly create accounts on the specified
websites.
Presentation Matters: Make your project clean, clear, and visually appealing. A well-
presented project facilitates a thorough evaluation.
ISO with IAF & MSME Verified Certificate: Our certificates hold ISO (with IAF) and MSME
verification by the Indian Government, ensuring global recognition and guaranteeing the quality
and authenticity of our programs. Your completion certificates will hold substantial value in the
cybersecurity industry worldwide.
Note:
If you are nominated for a letter of recommendation and Experience Certificate are among the top 30 interns, you
will be required to pay a small amount to receive the LOR, Experience Certificate & Skill India and NSDC verified
certificate.
CFSS Internship Program
SOC Analyst
Tools/Software:
Splunk: Used for collecting, indexing, and analyzing logs.
ELK Stack (Elasticsearch, Logstash, Kibana): Popular open-source software
for log management and visualization.
Graylog: Another log management tool used for real-time monitoring.
Steps:
Collect logs from servers, firewalls, and applications.
Configure alerts for specific keywords or patterns that indicate malicious
behavior (e.g., repeated login failures, unusual data access).
Analyze logs to identify potential threats or misconfigurations.
Tools/Software:
Snort: Open-source IDS/IPS (Intrusion Detection and Prevention System).
Suricata: Another IDS/IPS used for high-performance network monitoring.
Zeek (formerly Bro): Network monitoring framework for intrusion
detection.
CFSS Internship Program
Steps:
Install and configure Snort or Suricata on the network.
Customize rule sets to minimize false positives.
Analyze network traffic to identify malicious behavior or breaches.
Tools/Software:
CrowdStrike Falcon: A leading EDR tool for endpoint monitoring and
detection.
Carbon Black: Another EDR platform used for real-time visibility into
endpoint activity.
Microsoft Defender for Endpoint: A comprehensive security solution that
provides endpoint protection and threat intelligence.
Steps:
Investigate alerts from the EDR tool (e.g., suspicious processes, malware
indicators).
Run forensic analysis on infected endpoints.
Contain and remediate the threat on the endpoint.
Tools/Software:
Proofpoint: Email security software for phishing detection.
Mimecast: Another email security platform that helps in blocking phishing
emails.
OpenDXL (McAfee): Provides integrations for threat intelligence sharing to
help detect phishing.
CFSS Internship Program
Steps:
Analyze suspicious emails using the above tools.
Use threat intelligence platforms to check for indicators of compromise
(IoCs) related to phishing.
Educate employees and implement email filtering rules.
5. Vulnerability Management
Tools/Software:
Nessus: A vulnerability scanner used to find weaknesses in systems and
applications.
Qualys: Another vulnerability management tool that provides scanning and
assessment capabilities.
OpenVAS: Open-source vulnerability scanning tool.
Steps:
Run vulnerability scans on critical systems and assets.
Analyze the findings and prioritize remediation based on severity.
Track the progress of remediation efforts and re-scan after fixes are
applied.
Tools/Software:
FTK Imager: A forensic tool used for creating disk images and evidence
gathering.
The Sleuth Kit: Open-source forensic software for investigating incidents.
X1 Social Discovery: Used to extract and analyze social media evidence.
CFSS Internship Program
Steps:
Respond to an incident (e.g., malware infection, data breach).
Collect evidence from affected systems (e.g., hard drive images, memory
dumps).
Analyze the evidence to determine the cause and impact of the attack.
7. Threat Hunting
Tools/Software:
MITRE ATT&CK Framework: A knowledge base that provides techniques
and tactics used by adversaries.
OSQuery: Open-source tool for querying endpoints for suspicious activities.
AlienVault USM: Unified Security Management tool that integrates threat
intelligence.
Steps:
Leverage threat intelligence to hunt for specific attack techniques.
Use OSQuery or other endpoint detection tools to search for IoCs.
Document findings and provide recommendations to improve security
posture.
1. TryHackMe: Blue
Focus: Incident response aur log analysis.
Description: Ye challenge Windows environment par based hai
jahan aapko network intrusion aur log analysis karna hoga.
Skills: SIEM ka upayog, event log analysis, aur Indicators of
Compromise (IoCs) ki pehchaan.
Link: https://tryhackme.com/room/blue
3. TryHackMe: Wreath
Focus: Threat hunting aur malware analysis.
Description: Is challenge me aapko Windows environment me
adversarial techniques aur behaviors ko track karna hoga.
Skills: Threat intelligence, process analysis, aur malware artifacts
ki pehchaan.
Link: https://tryhackme.com/room/wreath
CFSS Internship Program