CSA WAI
security engineer includes managing the security posture, identifying and remediating vulnerabilities, performing threat modeling, and implementing threat protection.help you to translate organization's strategic requirements into actionable improvements in securing most valuable assets.
Different services to organization
- Review and implement wide range of InfoSec paradigms 
- including the foundations of risk management 
- implementing processes and controls 
- designing information systems securely 
- managing the day-to-day activities required to ensure security is maintained in organization. 
- Auditing and reviewing the threat landscape 
 
- Security reviews and threat modeling 
- Security assessments 
- Red team 
- Purple team 
- Blue team 
- Tabletop exercises 
- Research and development 
- Security education and awareness training 
- Threat Intelligence 
- Coordinating with risk management groups and leadership 
- Security integration with engineering processes 
Responsibilities:
- Cyber security standards 
- NIST CSF , CIS, CISA, Zero Trust, Defense in depth 
- To determine security requirements by evaluating business strategies 
- Researching information security standards 
- Application security and vulnerability management 
- Providing remediation recommendation upon vulnerability findings 
- Enforcing best practices 
- Baseline architecture/standards and security controls 
- Cloud 
- On premise 
- datacenter 
 
 
Frameworks
- NIST Cyber Security Framework 
- ISO 27001 and ISO 27002 
On Prem Network architecture
- Network configurations 
- VPN global protect 
- Cisco firewall 
- Switch configuration 
- VLAN Segmentation 
- Segmentation auditing 
- Servers 
- Routers 
- Access points 
- Which topologies we follow 
- Where are the datacenters 
- What is business continuity and DR plan 
- TCP/IP 
- OSI 
- IP v4 
- IP v6 
- DHCP 
- PAM 
- IPAM 
- SNMP 
- QOS cisco wireless 
- subnets 
- Network management protocols 
- Routing protocols 
- Security controls 
- SDN 
- Network management 
- Fault 
- Configuration 
- Performance 
- Security 
- Accounting 
 
- Which topology to use for continuously changing and hybrid environment ? 
- Network down time management strategies 
 
Cloud network architecture
Wireless network architecture
- Secure Wi-Fi 
- Guest Wi-Fi 
- Wi-Fi protocols 
- Attacks on wireless devices 
DevSecOps Architecture
- Multi cloud scenarios 
- Automation pipelines 
- Application security architecture, enforcing security policies and standards 
- Secure development life cycle 
- How to enforce application security and get more visibility 
- Logs 
- Waf 
- Load balancer 
 
- Focus on Java and PHP 
- Top vulnerabilities 
- IOT 
- OT 
- Web 
- API 
 
- Previously found scenarios 
- XSS 
- SQL injection 
- IDOR 
- SSRF 
- Deserialization (python, java, PHP) 
- XXE 
 
Threat Modeling
- New attacks/attack vectors 
- Risk assessment with architecture and business practices 
- Performing application security design reviews 
- New vulnerabilities and exploitation methods 
- Attack surface analysis and reduction 
- Targeting from 
- External web Apps 
- Services 
- Assets 
- Phishing 
- Third party 
 
Reverse engineering/binary analysis:
- Firm ware 
- Ghidra static analysis 
- Angr 
- BAP 
- AFL 
Applications
- Compilers 
- Types of compilers 
- Code changes 
 
- Interpreters 
IOT/embedded systems security
- Best practices 
- Secure boot 
- Secure debug 
- Secure storage 
- Secure communication 
- Using digital twin to protect the IOT/OT and critical operations 
- Anti-debugging and anti reverse engineering 
Red Team scenarios
- Phishing email Modiska 
- Subdomain enumeration, .git 
Malware analysis
- Ghidra 
- How malwares evade and hide 
Vulnerability Management
Networking:
- Fundamentals 
- VPN 
- IDS 
- Routing and Switching 
Cloud Security
- AWS 
- Azure 
- GCP 
Dataloss prevention:
- DLP, AIP 
Automotive standards
- ISO Sae j3101 https://www.sae.org/standards/content/j3101_202002/ 
AWS
- S3 buckets - exposure Grayhat Warfare. 
- Lamda 
- EC2 
- VPC 
- Aws cli 
- AWS API Gateway 
- connections outside of the VPC via a VPN 
- AWS inspector : for vulnerability analysis; runs automated security assessments on the EC2 instances 
Questions:
-
- different pen testing stages and strategies 
- What is threat modeling ? How to conduct and develop threat modeling for external facing web apps ? Mobile applications ? 
- How to develop threat modeling referring to PCI DSS standards 
- What is vulnerability 
- How to audit true positive and false positive 
- What is vulnerability management and assessment 
- CISA know vulnerability list 
- Federal department external pentest and scans 
- What are most recent vulnerabilities targeting 
- Winword 
- Outlook 
- Log4j 
 
- What are remediation strategies 
- Who are APT groups and who targets your industry 
ASV
- ASN 
- Domain reverse/cert/subdomain 
- Masscan options 
- Namp 
Ref
https://www.cloudflare.com/learning/ssl/why-use-tls-1.3/
WAF
- Imperva 
- F5 
Most common vulnerabilities
Responsibilities
Security Operations and Engineering
- Develop 
- Implement 
- Maintenance 
Security controls
- End point detection and response 
- SIEM 
- Security automation 
- Vulnerability Management 
Communicate with asset holders and stake holders
- Inventory Management 
- Cloud 
- IOT 
- On prem 
 
- SOAR/SIEM/VM 
- Continuous optimization tuning and monitoring platforms 
- Develop security playbooks 
- Windows os 
- Ad 
- Azure active directory 
- Security components 
 
- Log management 
- On prem 
- Cloud logging 
- Heavy forwarders 
- Cloud services logging 
- Reliable log forwarding 
 
- Daily monitoring and health of systems 
- Security baseline 
- Scripts to retrieve and perform actions on windows systems 
- Soar integrations and api 
- Group policies 
- DNS 
- Load balancing techniques 
- SSO 
- MFA 
Last updated
Was this helpful?