Join Malaysia’s career community
Share career tips and exchange stories with almost 2 million jobseekers – just like youA
Ali · 22 Feb 2024
Information Technology Security Analyst
Incident Response consist of Hunting the persistence threat to analyze the potentiality of a threat before the incident occur.
One of my method is, Retrieve the Artifact from Memory and Network connectivity BUT to ensure the Chain of Custody, which is the Integrity is the crucial part to preserve the authenticity of the data saved.
And to learn the threat with sandbox is better to understand how the malware working & executing.
L
Lily from Jobstreet · 22 Feb 2024
Hi, thanks for this info 🙂 👍
A
Ali · 22 Feb 2024
Information Technology Security Analyst
You’re welcome !
Want the full community experience? Get it on the app
Features are constantly being added from the ‘Career’ section of the Jobstreet app to this website. So, if you want an even better experience check out our app now.
Explore groups