Implementation and operation of Deception (Honeypot) for Cibersecurity Services of CMPC
Security Consultant - Resources needed to operate the implementation of deception
1.Cybersecurity and Network Security:
- Knowledge of network protocols (TCP/IP, UDP, DNS, etc.).
- Configuration and monitoring of firewalls, IDS/IPS systems, and proxies.
- Skills in performing network forensics and detecting malicious activity.
- Familiarity with cybersecurity frameworks such as MITRE ATT&CK.
2. Honeypots Administration and Configuration
- Experience with honeypot tools and platforms.
- Ability to configure honeypots according to the most critical assets of the enterprise.
- Knowledge of creating high and low interaction honeypots.
- Ability to integrate honeypots with systems without affecting the operation.
- Interpretation of logs generated by honeypots to identify attack patterns.
- Configuration of honeypots in cloud platforms such as AWS, Azure, or Google Cloud.
3. Threat Analysis and Incident Response.
- Skills in analyzing data captured by the honeypot and extracting useful information about attack vectors.
- Experience in incident management and creating mitigation strategies based on honeypot findings.
- Handling of Threat Intelligence and data correlation tools (SIEMs QRadar).
4. Automation and Programming
- Knowledge in languages such as Python to customize and automate honeypots.
5. Simulation and Testing
- Knowledge in attack simulation (network teaming) to test the effectiveness of the honeypot.
Keep up to date with the latest trends and threats in cybersecurity.
- Knowledge of security standards: Familiarity with security standards such as CIS.
- Willingness to learn new analysis tools and methodologies as technologies and threats evolve.
- English Language.