Cybersecurity Resume Examples & Interview Q
Cybersecurity Resume Examples & Interview Q
SECURITY
RESUME
EXAMPLES AND
FULL INTERVIEW
SIMULATION
BY IZZMIER IZZUDDIN
ENTRY-LEVEL CYBERSECURITY ANALYST RESUME
WAYNE ROONEY
Cybersecurity Analyst | Aspiring Blue Teamer
Kuala Lumpur, Malaysia | +60 12-345 6789 | [email protected]
LinkedIn: linkedin.com/in/waynerooney | GitHub: github.com/wayne
PROFESSIONAL SUMMARY
EDUCATION
Relevant Coursework:
• Network Security
• Operating Systems
• Ethical Hacking & Penetration Testing
• Information Assurance
CERTIFICATIONS
TECHNICAL SKILLS
Cybersecurity Tools:
Splunk, Wazuh, Wireshark, Security Onion, VirusTotal, MITRE ATT&CK Navigator, Zeek
Operating Systems:
Windows 10/11, Linux (Ubuntu, Kali), Windows Server 2016
Networking & Protocols:
TCP/IP, DNS, HTTP/S, FTP, SMB, VPN, SSH
Others:
Basic knowledge of PowerShell & Bash scripting, Ticketing Systems (ManageEngine demo)
• Set up Security Onion on a virtual lab to simulate log collection and alert analysis
• Analysed suspicious network traffic using Zeek and Suricata logs
• Created basic Splunk queries to detect brute force attacks and port scanning
INTERNSHIP EXPERIENCE
IT Support Intern
Maybank Berhad – Kuala Lumpur, Malaysia
Jan 2023 – June 2023
SOFT SKILLS
• Strong analytical and problem-solving skills
• Fast learner, highly adaptable
• Excellent communication and documentation skills
• Team-oriented and reliable
SIMULATED INTERVIEW FOR AN ENTRY-LEVEL CYBERSECURITY ANALYST
(L1) POSITION
Interviewer: Welcome, Wayne. Can you start by telling us a bit about yourself and why
you're interested in this role at Cybermir Defense?
Candidate (Wayne): Thank you for the opportunity. I’m Wayne Rooney, a recent graduate
in IT Networking from UiTM. During my studies and internship, I developed a strong interest
in cybersecurity, especially blue team operations. I’ve since completed several online
labs, including the TryHackMe SOC Level 1 path and earned my Security+ certification.
I’m excited about the role at Cybermir Defense because of your reputation in managed
SOC services and your use of advanced tools like Cortex XDR and Splunk. I believe this
environment will help me grow technically and contribute to real-world cyber defence
operations.
Candidate: The CIA triad stands for Confidentiality, Integrity and Availability. It's the
foundation of security principles:
Candidate:
Candidate: The principle of least privilege means giving users the minimum access or
permissions they need to perform their job. It helps reduce the risk of accidental or
intentional misuse of systems.
SECTION 3: TECHNICAL QUESTIONS
Interviewer: What are some common indicators of compromise (IOCs) you would look for
in log data?
Interviewer: Let’s say you receive a SIEM alert showing 20 failed login attempts followed
by one successful login. What would you do?
Candidate: First, I’d verify the user and the source IP. Then:
Candidate: DNS tunnelling is a technique where attackers encapsulate data into DNS
queries and responses to exfiltrate data or establish command-and-control. Since DNS
traffic is usually allowed, it can bypass firewalls if not inspected deeply.
Interviewer: Imagine a user reports their system is running slow and files are being
renamed with a “.encrypted” extension. What do you do?
Interviewer: You're on shift and receive a phishing alert triggered by the email gateway.
What steps will you take?
Candidate:
Candidate: SOC L1 analysts monitor SIEM alerts, investigate low to moderate severity
events, escalate confirmed incidents and document findings. We triage alerts based on
priority and relevance, check log sources, perform basic correlation and escalate complex
cases to L2.
Candidate: I’ve explored ManageEngine and ServiceNow in lab environments. I’m familiar
with raising, updating and closing tickets following standard operating procedures.
Candidate: I avoid jargon and use relatable analogies. For example, I might compare
phishing to someone pretending to be your bank and asking for your password. Clear,
simple language builds trust and understanding.
Candidate: I aim to move into an L2 role, get certified in Blue Team Level 1 or SC-200 and
specialise in threat hunting. I also want to mentor newcomers and eventually contribute to
building detection use cases.
Candidate: I’m comfortable with both. I enjoy independent investigations but also value
team discussions, especially during threat reviews and knowledge sharing.
INTERVIEW WRAP-UP
Interviewer: Thank you, Wayne. Do you have any questions for us?
CRISTIANO RONALDO
Cybersecurity Analyst | Threat Detection | Incident Response
Cyberjaya, Malaysia | +60 12-345 6789 | [email protected]
LinkedIn: linkedin.com/in/cristianoronaldo | GitHub: github.com/cristianocyber
PROFESSIONAL SUMMARY
EDUCATION
CERTIFICATIONS
TECHNICAL SKILLS
EXPERIENCE
• Triaged 1000+ security alerts using Splunk, Cortex XDR and Wazuh platforms
• Handled phishing, brute-force, data exfiltration attempts and privilege escalation
alerts
• Performed initial incident investigation (host-based, network-based and email-
based)
• Participated in on-call rotations for critical incident escalations
• Assisted in rule tuning and alert enrichment using MITRE mappings
• Generated daily and weekly security reports for client stakeholders
• Created and maintained internal SOC playbooks and alert response templates
• Conducted knowledge-sharing sessions for newly hired L1 analysts
Key Achievements:
SOFT SKILLS
Interviewer: Welcome, Cristiano. Could you please introduce yourself and share why
you're applying for this Cybersecurity Analyst L2 position at Cybermir Defence?
Candidate (Cristiano): Thank you. I’m Cristiano Ronaldo, currently a Senior Cybersecurity
Analyst L1 at IzzmierCyber Defense, where I’ve been for the past two years. My role
involves triaging alerts, performing incident investigations and supporting rule tuning.
I’m applying for this L2 position because I want to take on greater responsibility in handling
end-to-end incident response, threat hunting and play a bigger role in detection
engineering. I believe Cybermir Defence's reputation for advanced threat detection,
red/blue team collaboration and your use of modern tech stack really aligns with my
growth goals.
Candidate: An IOC refers to artefacts like file hashes, IP addresses or domain names that
signal a system might be compromised.
An IOA, on the other hand, focuses on the behaviour or intent behind the activity, such as a
process spawning PowerShell or lateral movement using SMB. IOAs are more proactive for
early-stage detection, especially for fileless or evolving threats.
Interviewer: Explain the MITRE ATT&CK framework. How do you use it in daily SOC
operations?
Interviewer: What are common false positives in a SOC and how do you reduce them?
Interviewer: You mentioned you work with Cortex XDR and Splunk. Can you walk us
through a typical investigation process you follow for a suspicious alert?
Candidate: Certainly. Let's say I get an alert from Cortex XDR for powershell.exe making a
network connection:
Interviewer: How would you write a basic Sigma rule to detect PowerShell downloads?
We use this to generate detections in platforms like Wazuh or translate to Splunk via
backend converters.
Interviewer: Let’s simulate a real-world case. You received a high-severity alert from
Splunk:
“Multiple failed logins from 1.1.1.1 to 5 different admin accounts within 2 minutes. One
success.”
Candidate:
Interviewer: Have you participated in threat hunting? Describe a hunt you've done.
Candidate: Yes. I recently ran a hunt based on the T1059.001 (PowerShell Execution)
technique.
• Objective: Identify misuse of PowerShell beyond normal admin tasks
• Hypothesis: Attackers use PowerShell with encoded commands to bypass
detection
• Method:
o Queried Splunk for PowerShell with long base64 strings
o Checked command length > 1000 chars
o Used CyberChef to decode
o Found an instance of PowerShell being used to drop reverse shell script
• Outcome: Blocked the IP, blacklisted hash, created a new Sigma rule and shared
findings with the L1 team
Interviewer: Do you use any open-source tools or platforms to support your work?
Interviewer: Have you ever made a mistake in handling an alert? How did you handle it?
Candidate: I usually do weekly 30-min review sessions with new L1s to go over unusual
alerts. I’ve also created an internal quick-reference guide for common IOCs and Splunk
queries.
It helps them feel supported and I enjoy the collaborative aspect of our SOC.
1. Does your L2 role get involved in purple teaming or detection engineering directly?
2. How does Cybermir Defence handle post-incident learning, do you do
retrospectives or tabletop simulations?
3. What’s the team’s current focus, alert fatigue reduction, automation or expanding
threat coverage?
CYBERSECURITY ANALYST L2 RESUME
CARLOS TEVEZ
Cybersecurity Analyst | Threat Detection & Response | SOC Leadership Path
Kuala Lumpur, Malaysia | +60 12-345 6789 | [email protected]
LinkedIn: linkedin.com/in/carlostevez | GitHub: github.com/carloscyber
PROFESSIONAL SUMMARY
CURRENT ROLE
Cybersecurity Analyst – L2
IzzmierCyber Defense Sdn Bhd, Kuala Lumpur, Malaysia
Sept 2022 – Present
• Led investigations for critical alerts involving data exfiltration, ransomware staging
and privilege escalation
• Created and maintained advanced correlation rules in Splunk, Wazuh and Microsoft
Sentinel
• Conducted root cause analysis and created incident reports for clients and internal
stakeholders
• Performed threat hunting using MITRE ATT&CK, OSQuery and Zeek logs
• Developed playbooks and detection rules for new threats (TTP-based rather than
IOC-based)
• Acted as escalation point for L1 team, reviewing alerts and assisting with triage
training
• Involved in client onboarding, log source mapping and detection readiness review
• Worked with SOAR engineers to automate repetitive tasks and triage enrichment
Key Achievements:
• Detected and contained a real-world Cobalt Strike beaconing event within 45 mins
• Reduced false positives in brute-force alerts by 40% through rule refinement
• Led a mini red vs. blue simulation with purple team to improve coverage on T1071.001
(Web C2)
EDUCATION
Bachelor of Information Technology (Networking)
Universiti Teknologi MARA (UiTM), Malaysia
Graduated: July 2023 | CGPA: 3.42
CERTIFICATIONS
SKILLS SNAPSHOT
Interviewer: Hi Carlos, welcome. To start off, could you briefly introduce yourself and
share why you’re interested in joining Cybermir Defence as a Cybersecurity Analyst L3?
Candidate (Carlos): Thank you. I’m Carlos Tevez, currently working as a Cybersecurity
Analyst L2 at IzzmierCyber Defense. Over the last 4 years, I’ve grown from triaging alerts to
owning full investigations, performing threat hunts and writing detection rules. I’ve also
been mentoring L1 analysts and leading some red/blue exercises internally.
What excites me about Cybermit Defence is your strong presence in the regional MDR
space and your blend of offensive and defensive capabilities. I’m ready to contribute at the
L3 level by leading investigations, improving detection logic and collaborating with your red
team to improve coverage.
Interviewer: What’s the difference between reactive incident response and proactive
threat hunting?
Candidate: Reactive incident response is initiated after an alert or breach has occurred,
based on existing rules or triggers. Threat hunting is proactive; it involves forming
hypotheses about undetected threats and manually searching across the environment
using behavioural patterns or weak signals, often without any initial alert.
Interviewer: Can you explain the Cyber Kill Chain vs MITRE ATT&CK?
Candidate: The Cyber Kill Chain provides a high-level sequence of attack stages, from
reconnaissance to exfiltration. It's useful for visualising the flow of an attack.
MITRE ATT&CK is more granular, it maps specific tactics, techniques and procedures used
by adversaries. I find MITRE more actionable for detection engineering, as it aligns better
with how attacks manifest in logs and telemetry.
Interviewer: When reviewing an alert, how do you determine if it’s a true positive vs a false
positive?
Interviewer: Tell us about a detection use case you developed and how you tested it.
• Detection logic: Look for mshta execution with http:// or .hta in the command line.
• Test: Simulated using a lab VM and executed a Interviewerign remote HTA file to
trigger detection.
• Result: Alert fired, no false positives in 7-day lookback.
I later added enrichment to pull process ancestry and geolocation of connections.
Interviewer: Have you written Sigma rules? If so, give us one for detecting credential
dumping via LSASS.
Candidate: Yes, I’ve written and converted many Sigma rules. Here's one for LSASS
access via tools like Mimikatz:
Interviewer: How do you deal with detection logic that causes alert fatigue?
Interviewer: Let’s walk through a scenario. You receive multiple alerts of powershell.exe
spawning from winword.exe across 3 endpoints. What do you do?
Candidate:
1. Triage: Confirm alerts are legitimate. Review process tree, command line (e.g.,
base64 encoded) and timestamps.
2. Correlate: Check whether all affected endpoints received the same Word file via
email or share.
3. Threat Intel: Decode payload, sandbox if needed (Any.Run), hash match with
VirusTotal.
4. Scope: Use EDR or SIEM to identify lateral movement or persistence.
5. Containment: Isolate machines, block indicators, notify IR.
6. Reporting: Create a detailed RCA. Map to MITRE (e.g., T1059, T1203). Recommend
awareness/training if it was a phishing attack.
Interviewer: Let’s say an attacker used certutil to download a tool and created a
scheduled task for persistence. What logs would you check?
• Sysmon logs:
o Event ID 1 (Process Creation for certutil.exe)
o Event ID 3 (Network connections)
• Task Scheduler logs:
o Task registration (Event ID 106)
• Windows Security:
o New service or registry changes (Event ID 4697 or 4657)
• Persistence techniques:
o T1053.005 (Scheduled Task)
I’d also pivot to see if this TTP was isolated or part of a broader campaign.
• Hypothesis: Attackers may use wmic process call create for stealthy lateral
execution
• Data sources: Sysmon Event 1, Win Event Logs
• Query: WMIC with keywords like “create” or “powershell”
• Findings: One case of legacy IT script, excluded. No malicious instances, but we
added a Sigma rule and trained L1s on it.
Documented the hunt and shared it in our quarterly threat briefing.
Interviewer: Have you worked with red teams or in purple team simulations?
Candidate: I hold weekly L1 knowledge huddles covering interesting cases and detection
logic.
For escalations, I guide L1s to ask key questions (what, where, how, why) before passing
the ticket. I avoid taking over immediately, coaching through the process builds their
confidence.
Candidate:
• Detection maturity: Align use cases with real threats (MITRE/CVE/Threat Intel)
• Automation: Collaborate with SOAR to auto-enrich triage
• Playbook improvement: Keep runbooks updated and tactical
• Red/blue feedback loop: After-action reviews with recommendations
• Metrics: Track MTTR, FP ratio, detection-to-containment time
Interviewer: That was excellent, Carlos. Do you have any questions for us?
Candidate: Yes, thank you. A few questions:
DIMITAR BERBATOV
Cybersecurity Analyst | Aspiring SOC Engineer | Detection Engineering | SIEM Development
Selangor, Malaysia | +60 12-345 6789 | [email protected]
LinkedIn: linkedin.com/in/dimitarberbatov | GitHub: github.com/dimitarcyber
PROFESSIONAL SUMMARY
CURRENT POSITION
• Collaborated with SOC engineering team on SIEM onboarding for 15+ log sources
including firewalls, proxies, endpoint and cloud (AWS, O365)
• Fine-tuned detection rules in Splunk and Wazuh, improving alert precision and
reducing false positives by over 35%
• Built and modified Sigma rules for ATT&CK-aligned detection use cases
• Conducted parsing validation, field extractions and log normalization (CEF, JSON,
Syslog)
• Assisted in SOAR integration for Cortex XDR alert triage automation
• Documented and maintained detection rules, use case mapping and playbooks in
Confluence
• Provided escalation guidance and supported junior analysts with investigation
workflow
Key Projects:
• Built alert correlation rule for multi-vector brute-force followed by PowerShell beacon
• Supported Sentinel rule migration and KQL query optimisation for one major enterprise
client
• Developed log onboarding checklist and mapping template for SIEM engineers
EDUCATION
Bachelor of Information Technology (Networking)
Universiti Teknologi MARA (UiTM), Malaysia
Graduated: July 2022 | CGPA: 3.42
CERTIFICATIONS
SKILLS MATRIX
SIEM Platforms:
Detection Engineering:
Threat Intelligence:
• Created 20+ custom rules for techniques such as T1059 (Command Execution),
T1078 (Valid Accounts)
• Built weekly dashboards for detection efficacy and gap analysis
Interviewer: Hi Dimitar Berbatov, welcome. Can you start by telling us a bit about yourself
and why you're applying for the SOC Engineer role here at Cybermir Defence?
Interviewer: What do you think is the core difference between a SOC Analyst and a SOC
Engineer?
Candidate: A SOC Analyst consumes alerts and investigates threats, while a SOC
Engineer builds and maintains the systems that generate those alerts. Analysts focus on
incident detection and response, while engineers ensure the SIEM, log pipelines, detection
rules and enrichment logic are functioning properly and efficiently.
Interviewer: Can you explain the importance of log source normalization in a SIEM?
Interviewer: What’s the MITRE ATT&CK framework’s role in building detection content?
Candidate: MITRE ATT&CK helps structure and prioritise detection logic based on real-
world attacker TTPs. As a SOC Engineer, I use it to align detection rules to relevant
techniques (e.g., T1059.001 for PowerShell abuse), ensuring we detect behavioural
indicators, not just IOCs. It also supports detection coverage reporting and gap analysis.
Interviewer: You’ve used Splunk before. How do you test and deploy a new detection rule?
Candidate:
Interviewer: Can you write a basic SPL detection for detecting rundll32.exe spawning
PowerShell.exe?
index=windows sourcetype=Sysmon
Image="*\\rundll32.exe" ParentImage="*\\powershell.exe"
| stats count by ComputerName, Image, ParentImage, CommandLine, _time
Alternatively, I'd reverse the parent-child based on the environment and add filters to
reduce noise from legitimate admin tasks.
Interviewer: What’s your approach to building correlation logic for multi-stage attacks?
Candidate: I first map the attack stages to MITRE (e.g., Initial Access → Execution → C2).
Then, I build logic that links separate alerts or events within a time window:
Interviewer: Let’s simulate a case. A client complains about missed detections during a
red team test. Where do you begin?
Candidate:
1. Log Coverage Audit – Verify required log sources (e.g., EDR, Sysmon, firewall) were
ingested during the red team window
2. Detection Review – Cross-check existing rules against red team TTPs (e.g.,
T1021.001 – RDP)
3. Test Replay – Replay test artefacts or logs in dev to identify failure points
4. Gap Fix – Build or tune rules, improve field extraction if parsing failed
5. Report – Document findings, detection gaps and mitigation steps
6. Simulate & Validate – Re-run detection test to verify fix before client debrief
Interviewer: You're onboarding logs from a new Palo Alto firewall. What’s your approach?
Candidate:
1. Validate Connectivity: Ensure logs are reaching the SIEM (via Syslog/CEF)
2. Parsing Check: Confirm field mapping (e.g., src_ip, action, threat_id) using
sourcetype=paloalto
3. Field Normalisation: Ensure alignment with CIM or internal standards
4. Use Case Mapping: Determine which existing rules apply (e.g., port scans, malware
blocking)
5. Test Alerts: Trigger a sample alert using test traffic
6. Documentation: Update log onboarding matrix and SIEM inventory
Interviewer: If a detection rule is firing excessively after deployment, how would you tune
it?
Candidate:
Interviewer: Can you explain the difference between raw logs, parsed logs and normalised
logs?
Candidate:
Interviewer: Have you dealt with broken field extractions? What’s your approach?
Candidate: Yes. I use rex, spath or field extractor tools to fix broken parsing. I test regex on
sample data, apply it to the dev environment and validate with multiple log samples. I also
ensure naming follows SIEM field standards (src_ip, dest_port, etc.).
Candidate: I hold regular review sessions with L1/L2s to gather feedback on noisy rules. I
look at:
Interviewer: Thank you, Dimitar. Do you have any questions for us?
PATRICE EVRA
Cybersecurity Analyst | Threat Intelligence-Focused | MITRE ATT&CK Mapping | IOC & TTP
Enrichment
Kuala Lumpur, Malaysia | +60 12-345 6789 | [email protected]
LinkedIn: linkedin.com/in/patriceevra | GitHub: github.com/patricecyber
PROFESSIONAL SUMMARY
CURRENT POSITION
Key Achievements:
EDUCATION
CERTIFICATIONS
Others
• Sigma Rules (for TI-enhanced detections), KQL, Python (IOC parsing scripts),
GitHub IOC automation, ATT&CK Navigator
• Developed internal tracker for recurring IPs/domains associated with phishing &
malware delivery
• Integrated into SOC workflows for IOC correlation and enrichment
• IOC Enrichment Reports: Containing pivoted data, source attribution and timeline
• Threat Briefs: Monthly PDF reports summarising regional threats and emerging
actor activity
• TTP Analysis: ATT&CK-mapped profiles based on internal detection trends
• Playbook Support: Provided intel for IR team to enhance phishing response SOPs
Interviewer: Welcome, Patrice! Let’s start with a brief introduction. Can you tell us about
yourself and what motivated you to apply for this CTI L3 role at Cybermir Defence?
Candidate (Patrice):
Thank you. I’m Patrice Evra, currently a Cybersecurity Analyst L2 embedded in a CTI-
supporting role at IzzmierCyber Defense. Over the last 4 years, I’ve transitioned from
traditional SOC analysis into supporting intelligence-driven investigations, enriching IOCs,
tracking campaigns and building threat actor profiles aligned with MITRE ATT&CK.
I’m particularly drawn to Cybermir Defiance’s focus on regional threat research and actor
tracking. I want to contribute more strategically to CTI by producing higher-value
intelligence that informs not just detections, but also threat hunting, response and
executive risk decisions.
Interviewer: What’s the difference between tactical, operational and strategic threat
intelligence?
Candidate:
• Tactical Intelligence focuses on IOCs, hashes, IPs, domains, and is used directly for
detection and blocking.
• Operational Intelligence provides insight into ongoing attacks: TTPs, malware
families, C2 infrastructure, used by blue teams and IR.
• Strategic Intelligence gives high-level, long-term context, such as threat actor
motivations, geopolitical risks and industry-specific targeting. This is used by
executives to assess risk and plan.
Candidate:
Interviewer: Have you ever written a YARA rule? If so, for what?
Candidate: Yes. I wrote YARA rules to detect VBA macro malware that dropped reverse
shell payloads. I focused on identifying suspicious keywords, obfuscation functions like
Chr, Shell and encoded strings, especially those common in Agent Tesla and FormBook
loaders. I tested them in sandbox environments like Any.Run before sharing internally.
Interviewer: Let’s say you receive an IOC from VirusTotal: a suspicious executable hash.
How would you go about validating and enriching it?
Candidate:
1. Submit the hash to VirusTotal and review the detection ratio and behavioural
analysis
2. Pivot on:
o Domains contacted
o Mutexes created
o File names used
o PDB paths
3. Use sandbox platforms like Any.Run or Intezer to confirm malicious behaviour
4. Check for relationships with known malware families or campaigns
5. Tag relevant MITRE ATT&CK techniques (e.g., T1059 if PowerShell used)
6. Add contextual info: targeted sectors, first-seen dates, C2 activity
7. Push enriched IOC to MISP or TI dashboard with confidence levels
Interviewer: Here’s another scenario: You suspect that a client is targeted by a new spear-
phishing campaign. What’s your approach?
Candidate:
Candidate:
Interviewer: How do you make intelligence reports relevant for both technical teams and
executives?
Interviewer: How do you handle false attribution or conflicting intel across different TI
sources?
Candidate:
Interviewer: Which actor groups do you follow most closely and why?
Candidate: I follow APT36, Mustang Panda and Lazarus Group due to their frequent
targeting of Southeast Asia and use of phishing + living-off-the-land binaries. Their TTPs
change often, so tracking their infrastructure and malware delivery methods gives valuable
context for local clients.
Interviewer: How would you update detection content based on CTI findings?
Candidate:
• Translate actor TTPs to Sigma rules (e.g., T1218.005 for mshta abuse)
• Share payload characteristics with EDR/IR teams
• Update IOC watchlists and alert thresholds
• Recommend suppression for Interviewerign overlap cases
• Test detection efficacy post-update with simulated artefacts
Interviewer: Thanks Patrice, that wraps up our questions. Do you have anything you’d like
to ask us?
RYAN GIGGS
Cybersecurity Analyst | DFIR-Focused | Incident Response | Digital Forensics
Cyberjaya, Malaysia | +60 12-345 6789 | [email protected]
LinkedIn: linkedin.com/in/ryangiggs | GitHub: github.com/ryancyber
PROFESSIONAL SUMMARY
CURRENT ROLE
Key Achievements:
• Isolated and analysed a targeted malware variant via memory analysis and string
extraction
• Contained lateral movement of ransomware via quick pivoting through firewall, AD and
endpoint logs
• Reduced IR response time by 40% through automation of initial evidence gathering
scripts
EDUCATION
CERTIFICATIONS
TECHNICAL SKILLS
• Windows Event Logs, Sysmon, Zeek, Bro, PowerShell history, USN journal, MFT
analysis
• Python (IOC extractor, memory hash validator), Bash, Sigma rule writing
• Wrote scripts for mass log export from infected hosts (Event Logs, Autoruns,
Prefetch)
• Created standardised initial evidence collection checklist for L1 handoff
Interviewer: Hi Ryan! Let’s start with a quick introduction. Can you tell us about your
background and what made you apply for the L3 DFIR position here at Cybermir Defence?
Candidate (Ryan): Thank you. I’m Ryan Giggs, currently a Level 2 Cybersecurity Analyst at
IzzmierCyber Defense, with over four years of SOC experience. In the past two years, I’ve
been deeply involved in incident handling, live response and forensic support during
malware and insider threat cases. I’ve conducted disk imaging, memory analysis and
helped document root cause analysis for real-world ransomware and credential theft
cases.
I'm excited about Cybermir Defence's reputation for deep forensic work and advanced
incident handling. I'm ready to lead DFIR investigations and contribute to post-incident
analysis, playbook development and forensic readiness initiatives at an L3 level.
Interviewer: Explain the difference between volatile and non-volatile data in forensics.
Which would you collect first and why?
Candidate:
Interviewer: Which forensic tools have you used and for what purposes?
Candidate:
Candidate:
Candidate:
Interviewer: Let’s say a user reports their files were renamed with .CRYPT3 and a ransom
note appears. Walk us through your steps.
Candidate:
1. Initial Response:
o Instruct user to disconnect from the network
o Capture a memory dump and volatile data
o Identify the ransomware variant (check ransom note, file headers,
command-line activity)
2. Containment:
o Isolate other machines showing encryption signs
o Block associated IPs/C2 if known
3. Investigation:
o Review Sysmon for dropped files, suspicious child processes
o Check use of vssadmin, wevtutil or shadow copy deletion
o Trace lateral movement (e.g., via SMB, RDP logs)
4. Eradication & Recovery:
o Remove malware
o Rebuild from backups (verify clean)
5. Post-Incident:
o Document full attack chain
o Deliver IOCs to SOC for future detections
o Update ransomware playbook
Interviewer: During a phishing attack, credentials were stolen. What logs and artefacts
would you collect?
Candidate:
Candidate:
Interviewer: How do you ensure collaboration between DFIR, legal and other
stakeholders?
Candidate:
Interviewer: Thank you, Ryan. That’s all from us. Do you have any questions for us?
ROY KEANE
Cybersecurity Analyst | Incident Responder | Threat Containment & Root Cause Analysis
Kuala Lumpur, Malaysia | +60 12-345 6789 | [email protected]
LinkedIn: linkedin.com/in/roykeane | GitHub: github.com/roycyber
PROFESSIONAL SUMMARY
CURRENT ROLE
Key Accomplishments:
EDUCATION
Bachelor of Information Technology (Networking)
Universiti Teknologi MARA (UiTM), Malaysia
Graduated: July 2021 | CGPA: 3.45
CERTIFICATIONS
TECHNICAL SKILLS
Interviewer: Hi Roy, welcome to Cybermir Defence. Can you start by introducing yourself
and sharing why you're interested in this L3 Incident Response role?
Candidate (Roy): Thank you. I’m Roy Keane, currently a Level 2 Cybersecurity Analyst at
IzzmierCyber Defense. I’ve spent the last four years in active SOC environments, but over
the past two, my focus has shifted heavily into incident response. I’ve led containment
during ransomware attempts, coordinated with stakeholders during phishing-to-MFA-
bypass incidents and authored RCA reports with MITRE mapping.
I’m applying for this L3 role at Cybermir Defence because your response centre is known
for leading regional investigations and building out response automation. I’m ready to take
the lead in incident triage, evidence gathering and post-incident lessons learned while
contributing to IR maturity and knowledge sharing.
Interviewer: Can you walk us through the standard phases of an incident response?
Candidate:
Interviewer: What are your go-to tools for investigating endpoint-related incidents?
Candidate:
• Cortex XDR & SentinelOne – For EDR telemetry, process trees, host isolation
• Redline & Velociraptor – For live response and memory artefact collection
• Autoruns, Process Hacker, PEStudio – For persistence and suspicious binaries
• Volatility – For memory analysis
• CyberChef – For decoding payloads or encoded PowerShell
I usually start with EDR pivoting and memory capture if there's evidence of post-
exploitation activity.
Candidate: Yes. I created Python scripts that automatically enrich alerts with WHOIS and
VirusTotal data. We also used SOAR (via Cortex XSOAR) to auto-isolate hosts upon
confirmed IOC match, notify stakeholders and open a ticket in the IR queue.
Candidate:
• For Azure: Review Audit Logs, Defender for Cloud alerts and AAD sign-ins
• For AWS: Use CloudTrail, GuardDuty and IAM role history
• Investigate IAM abuse, misconfigurations and lateral movement using CLI logs
• I ensure all IR actions are cloud-safe (e.g., acquiring volatile logs via APIs instead of
snapshots where possible)
Interviewer: Let’s do a walkthrough. A user reports their PC is running slow. EDR shows
rundll32.exe spawning PowerShell that connects to an IP in Russia. What do you do?
Candidate:
1. Triage the Alert:
o Validate the alert with EDR: check parent process, command line, IP
reputation
2. Isolate the Host:
o Immediately isolate via EDR to stop any lateral movement
3. Collect Evidence:
o Take a memory snapshot
o Capture event logs (Sysmon, Security), prefetch and persistence points
4. Investigate:
o Decode PowerShell payload (base64, obfuscation)
o Check for additional persistence (scheduled tasks, registry run keys)
o Trace other connections and domain resolutions
5. Containment:
o Remove malware
o Reset credentials if credential theft is suspected
6. Eradication & Recovery:
o Patch any vulnerabilities exploited
o Reimage if system integrity is questionable
7. RCA & Reporting:
o Deliver detailed MITRE ATT&CK-mapped report
o Share IOCs with SOC and TI teams
Interviewer: What logs would you collect for lateral movement detection?
Candidate:
Interviewer: If you find lsass.exe being accessed by an unknown process, what would you
do?
Candidate:
Candidate:
Interviewer: How do you coordinate with SOC and threat intel during an ongoing incident?
Candidate:
Interviewer: How do you handle pressure during a live incident with senior stakeholders
involved?
Candidate: I stay focused on facts, stick to known data and give frequent, clear updates. I
provide confidence ratings, explain next steps and avoid technical overload when speaking
to non-technical execs. After stabilising the incident, I ensure the RCA is thorough to
prevent recurrence.
Interviewer: Thanks Roy. That concludes the technical part. Do you have any questions for
us?
1. How does Cybermir Defence structure the escalation process between L2 and L3
during high-severity incidents?
2. Does the L3 IR role get involved in red team aftermath or purple teaming activities?
3. Is there support for advanced training or certifications like GCIH, GCFA or cloud IR
labs?
CYBERSECURITY ANALYST L3 RESUME
PAUL SCHOLES
Senior Cybersecurity Analyst (L3) | SOC Operations Leader | Threat Response Strategist
Cyberjaya, Malaysia | +60 12-345 6789 | [email protected]
LinkedIn: linkedin.com/in/paulscholes | GitHub: github.com/paulcyber
PROFESSIONAL SUMMARY
CURRENT ROLE
• Lead technical response for P1 and P2 security incidents across 30+ clients
• Mentor and manage a team of 6 L1/L2 analysts, overseeing daily SOC operations
• Built detection use cases mapped to MITRE ATT&CK, including ransomware, lateral
movement and living-off-the-land attacks
• Designed response playbooks and automated alert enrichment using Cortex XSOAR
and Python
• Coordinated with Threat Intelligence, Cloud Security and Engineering teams during
major IR efforts
• Represented SOC in client review calls and post-incident briefings
Key Achievements:
PAST ROLE
EDUCATION
CERTIFICATIONS
TECHNICAL SKILLS
• Established weekly use case review meetings with TI and detection teams
• Introduced change management protocol for rule lifecycle management
• Deployed unified dashboards and reporting for clients using Splunk & Power BI
• Reduced client alert fatigue by tuning use cases based on true positive rates
Interviewer: Hi Paul, thank you for joining us today. Could you start by introducing yourself
and share why you're interested in leading our SOC here at Cybermir Defence?
Candidate (Paul): Thank you. I’m Paul Scholes, currently a Senior Cybersecurity Analyst
(L3) at IzzmierCyber Defense. With over 6 years in cybersecurity, 4 of those in SOC
operations, I’ve led incident response, built use cases, improved alert fidelity and
mentored analysts.
I’m excited by the opportunity at Cybermir Defence because of your multi-sector MSSP
footprint and your growing SOC infrastructure. I believe I can bring not only technical
guidance but also people leadership and strategic direction to scale and mature your SOC.
My vision is to build a proactive, metrics-driven and resilient SOC that operates with
confidence, structure and measurable value.
Interviewer: What do you think are the top three challenges a SOC faces today?
Candidate:
1. Alert fatigue – Too many false positives can demotivate analysts and waste time
2. Talent retention – SOC burnout is real, especially in 24/7 environments
3. Detection quality vs visibility – Many organisations onboard tools but underutilise
them due to poor log management or detection logic
The solution lies in balancing automation, focusing on detection engineering quality and
investing in career paths and analyst development.
Interviewer: As Head of SOC, how would you describe your leadership style?
Candidate: I lead by accountability, clarity and empathy. I believe in defining clear KPIs
and responsibilities, but I also actively listen to the team. I foster a collaborative
environment, ensure they feel supported and give them space to grow. I coach analysts not
just to resolve alerts but to think like investigators and defenders.
Interviewer: What’s your experience with SIEM and detection engineering oversight?
Candidate: I’ve worked with Splunk, Sentinel and Wazuh extensively. I led a team that
deployed and maintained 60+ use cases aligned with MITRE ATT&CK. I standardised rule
creation and lifecycle governance, introduced weekly detection review sessions with our
red team and implemented performance dashboards to track true vs. false positive ratios.
Interviewer: What would your first 90 days look like as Head of SOC here?
Day 31–60:
Day 61–90:
Candidate: Yes. As L3, I was the lead for client escalations during major incidents. I
handled technical briefings, wrote post-incident reports and participated in lessons-
learned sessions. I believe in full transparency, owning both our success and our blind
spots.
Interviewer: A major client is hit by ransomware. SOC misses the early signs. You’ve been
alerted mid-stage. What do you do?
Candidate:
Interviewer: You discover one of your senior analysts failed to escalate a critical alert that
later turned into a breach. How do you handle it?
Candidate: I handle it constructively but firmly. First, I meet with the analyst privately to
understand context , was it lack of knowledge, pressure or alert fatigue?
Then, I:
Candidate:
• MTTD / MTTR
• True Positive Rate vs. False Positive Rate
• Use Case Coverage vs. Threat Landscape
• Analyst Escalation Accuracy
• Incident SLA Compliance
I’d also track analyst wellness via ticket backlog, after-hours escalations and alert
volume per person.
Candidate:
Interviewer: Thank you, Paul. We’ve reached the end of our questions. Do you have any for
us?