Security Intelligence Analyst - Author Award for Professsionals 2016 - Badge
Name
Security Intelligence Analyst - Author Award for Professsionals 2016.
Issuer
IBM.
Description
The badge earner has significantly contributed to the authoring of courseware: labs; exams; quizzes; virtual machines; etc. The course objective is to teach students how to correlate events & flows from a variety of apps and devices; establish enterprise security rules; monitor policy compliance; & provide threat detection; using IBM QRadar SIEM. The author has developed assets that teach students topics such as investigating offenses identified from events & flows; & create operational rules.
Badge Criteria
What it takes to earn this badge:
- Expected to be an Information Technology professional working for IBM an IBM Customer or Business Partner.
- Subject Matter Expertise of topics in Module I - Cyber Security Overview: Covering Status quo of IT Security and Security Intelligence and Operations.
- Subject Matter Expertise of topics in Module II - Security Intelligence Foundations: Covering Designing a Security Intelligence Solution and Security Intelligence functional components.
- Subject Matter Expertise of topics in Module III - Security Intelligence Analyst: Covering Collecting and processing events flows and vulnerability data Investigating an offense that is triggered by events Investigating the events of an offense Using asset profiles to investigate offenses Investigating an offense that is triggered by flows False positives overview Investigating superflows Using rules and building blocks Creating SIEM repts and Perfming advanced filtering.
- The above expertise must be demonstrated by holding a professional certification and/ have 5 years of experience in the application development a relevant field.
- Validated contribution to the development of assets of the course components by the wld wide IBM education program leader.
Tags
Skills indicated by the badge
QRadar SIEM|Security Offenses|Security Vulnerabilities|Security Offense Rules|Security Intelligence|Advanced Security Threats|Enterprise Security Architecture|Threat Intelligence Feed|Host Definition Building Blocks|Advanced Filtering|Investigating Security Offenses|False Positives|Event Offenses|Collecting Events|Processing Events|Vulnerability Data|Asset Profiles|SIEM Reports|Security Analyst