Ali Çiftci
Cyber Defense Center Specialist at Cyberwise- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
Certified Ethical Hacker v11 Master
EC-CouncilNov, 2021- Nov, 2024 -
Certified Ethical Hacker v11 Practical
EC-CouncilNov, 2021- Nov, 2024 -
Microsoft Certified: Security Operations Analyst Associate
MicrosoftNov, 2021- Nov, 2024 -
Certified Ethical Hacker v11 (CEH)
EC-CouncilOct, 2021- Nov, 2024 -
CompTIA Security+ sy0-601 ce Certification
CompTIAApr, 2021- Nov, 2024 -
Foundations of Operationalizing MITRE ATT&CK
AttackIQDec, 2020- Nov, 2024 -
Siber Olay Tespit ve Müdahale
BTK AkademiDec, 2020- Nov, 2024 -
Liderlik
BilgeİşOct, 2020- Nov, 2024 -
Siber Güvenlik Teknolojileri Kampı
InnoveraOct, 2020- Nov, 2024 -
Doğru Pazarlama İletişimi İle Farklılık Yaratmak
BilgeİşSep, 2020- Nov, 2024 -
Çatışma Yönetimi
BilgeİşSep, 2020- Nov, 2024 -
Cyber Anadolu Cyber Security CTF Program
Türkiye Siber Güvenlik KümelenmesiFeb, 2020- Nov, 2024 -
Machine Learning
TurkcellFeb, 2020- Nov, 2024 -
Data Science and Artificial Intelligence
TurkcellJan, 2020- Nov, 2024 -
KOSGEB Advanced Entrepreneurship Certificate
KOSGEBJan, 2020- Nov, 2024 -
KOSGEB Girişimcilik Sertifikası
KOSGEBNov, 2019- Nov, 2024 -
Siber Güvenlik Uzmanlığı (120 saat)
Bilgi Teknolojileri ve İletişim Kurumu - BTK - ICTNov, 2019- Nov, 2024
Experience
-
Cyberwise
-
Türkiye
-
Computer and Network Security
-
200 - 300 Employee
-
Cyber Defense Center Specialist
-
Nov 2022 - Present
• Examining the incidents escalated from the L1 analysts, evaluating the emerging threat intelligence, identifying the affected systems and the scope of the attack, collecting information on the systems that may be exposed to the attack for further research stages, determining and managing the remediation and recovery plan.• As a digital forensics investigator, leading and performing malware, windows, network and memory forensics.• Developing use case scenerios and writing SIEM correlation rules to detect web exploitation attempts, windows lateral movements, post exploitation techniques, malware behaviours and suspicious network activities.• Performing detailed analysis of alerts and potential threats, as well as alert correlations across CDC monitoring and threat detection tools.• Identify and analyze anomalies in event data to identify security issues.• Provide analysis and reporting of threats, vulnerabilities and incidents.• Additional risk management activities as needed for threats. Show less
-
-
Senior Cyber Defense Center Analyst
-
Apr 2022 - Oct 2022
• Identify and analyze anomalies in event data to identify security issues.• Provide analysis and reporting of threats, vulnerabilities and incidents.• Monitors and investigates incidents and sometimes further actions incident response.• Document and disseminate reports and notifications of findings in a timely SLA.• Additional risk management activities as needed for threats.• As a digital forensics investigator, leading and performing malware analysis.• Developing use case scenerios and writing SIEM correlation rules to detect web exploitation attempts, windows lateral movements, domain persistence techniques, malware behaviours and suspicious network activities.• Performing daily detect & respond functions, working closely with CDC processes on SIEM and SOAR.• Performing detailed analysis of alerts and potential threats, as well as alert correlations across CDC monitoring and threat detection tools. Show less
-
-
Cyber Defense Center Analyst
-
Dec 2020 - Apr 2022
• Perform daily detect & respond functions, working closely with SOC processes on SIEM and SOAR.• Performs detailed analysis of alerts and potential threats, as well as alert correlations across SOC monitoring and threat detection tools.• Identify and analyze anomalies in event data to identify security issues.• Provide analysis and reporting of threats, vulnerabilities, and incidents.• Monitors and investigates incidents and sometimes further actions incident response.• Document and disseminate reports and notifications of findings in a timely SLA.• Additional risk management activities as needed for threats. Show less
-
-
-
Udemy
-
United States
-
E-Learning Providers
-
700 & Above Employee
-
Cyber Security Instructor
-
Apr 2020 - Present
-
-
Education
-
OSTİM Teknik Üniversitesi
Önlisans, Bilgi Güvenliği Teknolojileri -
Anadolu Üniversitesi
Lisans Derecesi, Yönetim bilişim sistemleri