Mosadiwamotse Khabong
LEVEL1 SOC ENGINEER at CyberAntix- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification
MITREApr, 2021- Oct, 2024 -
MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification
MITREApr, 2021- Oct, 2024 -
MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Issuing authorityMITRE
MITREApr, 2021- Oct, 2024 -
Demisto Administration: Administration of Next Generation SOC
DEMISTOMar, 2021- Oct, 2024 -
Demisto Engineer: Building the Next Generation SOC
DemistoMar, 2021- Oct, 2024 -
Linux+ Powered by LPI Certification
Linux Professional InstituteJan, 2019- Oct, 2024 -
Cisco Certified Network Associate Cyber Ops (CCNA)
CiscoJan, 2018- Oct, 2024 -
IOT Security
Cisco Networking AcademyJan, 2019- Oct, 2024 -
Microsoft Certified Solutions Associate: Windows Server 2012
Bandwidth TechnologiesJan, 2017- Oct, 2024 -
Microsoft Certified Systems Engineer: Security (MCSE)
Bandwidth TechnologiesJan, 2017- Oct, 2024 -
Demisto analyst traning
DEMISTER LTD
Experience
-
CyberAntix
-
South Africa
-
IT Services and IT Consulting
-
1 - 100 Employee
-
LEVEL1 SOC ENGINEER
-
Nov 2020 - Present
Remediate non-compliance with technical and security requirements. Escalates high or critical severity level incidents to Incident Investigators. Participates of the improvement plan for service efficiency and detection rules. Works independently to perform analyses and investigations. Monitor alerts/events from various security tools (SIEM, Syslog etc.) Identifies problems and errors prior to or when they occur Log all incidents in a timely manner with the required level of detail Data capturing of report incidents Technologies • XSOAR • Sophos • Securonix Show less
-
-
-
-
Nil Academy CyberOps Learner
-
Sep 2017 - 2019
Explain the role of the Cybersecurity Operations Analyst in the enterprise. Explain the Windows Operating System and Linux Operating System. Explain the operation of network infrastructures. Analyze the operation of network protocols and services. Classify the various types of network attacks. Use network monitoring tools to identify attacks against network protocols and services. Explain how to investigate endpoint vulnerabilities and attacks. Evaluate network security alerts. Analyze network intrusion data to identify vulnerabilities and compromised hosts. Explain how security incidents are handled by CSIRTs Show less
-
-
-
Department of health
-
United States
-
Medical Practices
-
1 - 100 Employee
-
Information Technology
-
Sep 2016 - Sep 2017
-
-
-
Department of Education Services
-
Government Administration
-
100 - 200 Employee
-
Technician
-
Aug 2011 - Jul 2013
-
-
Education
-
Cisco Networking Academy
Certificates, Information Technology -
Bandwidth Technilogies
Microsoft Certified Solution Expert, Computer/Information Technology Administration and Management -
EkasiIT Solutions PTY LTD
System Support NQF 5, Information Technology -
Central Johannesburg College
Mechanical Engineering -
Quantum career developers
IT Technical Support NQF 4, Information Technology