Try our new research platform with insights from 80,000+ expert users

Badges

55 Points
9 Years

User Activity

Over 6 years ago
Chris, you need to understand three areas where you will be required to work to achieve what you are looking for 1. Rule set that correlate events for define compliance purpose ( most of the SIEM solution provide these rules out-of-the-box) 2. log source integration (…
Almost 8 years ago
Contributed a review of IBM Security Guardium Data Protection: The query rewrite and redaction functions provide flexible/dynamic control of our data.

Reviews

Answers

Over 6 years ago
Security Information and Event Management (SIEM)

About me

Expertise in Information Security Logs correlation and investigation using Security Incident and Event Management, and Database Activity Monitoring Tools. Specially IBM Qradar and Infosphere Guardium.

Past Experience of vulnerability management program, ISO 27001 standard, and Embedded Device Programming including FPGA, microcontroller, and PLCs.

Specialties:
Security Information and Event Management
• IBM Qradar Administration
• IBM Qradar Custom rule, offense and report development
• IBM Qradar Log Source Extension (LSX) development for custom log sources
• IBM Qflow layer-7 monitoring
Database Activity Monitoring
• IBM Infosphere Guardium Administration
• IBM Infosphere Guardium database security policies development
• IBM Infosphere Guardium database vulnerability assessment
Information Security Investigation (Correlation of logs, flows and incident information)
Vulnerability scanning (Nessus, Acunetix)

Academic background in Computer Engineering with specialization in Information Security, Networking, Automation and Control System