Security Operations Role
Job Responsibilities included
Questions asked to me
Explain TCP vs UDP
Explain the difference between a vulnerability, risk and threat.
How would you utilize Threat Intel feeds?
Technical Exercise
You get forwarded [the following email] to your phishing reporting mailbox, how do you determine this is either a phishing email or a legitimate email?
Walk through your analysis process.