Threat Detection/Hunting

Perkoh Donkoh

Utilized a SIEM tool like Splunk and a network traffic analysis tool like Wireshark to monitor for threats traversing networks and uncover how malicious attackers were able to exploit a system after an incident
Like this project

Posted Jun 29, 2024

I monitored and analyzed network traffic as they traversed through a network to in order to find IOCs or threats and also uncovered how a network was exploited

Likes

0

Views

0

Join 50k+ companies and 1M+ independents

Contra Logo

© 2025 Contra.Work Inc