top of page

Cyber
security

CYBER SECURITY

Nowadays, attention to cybersecurity is no longer a choice but an absolute necessity. It is not a question of whether one will have to deal with a security incident, but when. That is why preventive monitoring of activities across the various systems is essential, especially in the world of cybersecurity. Prevention is better than cure.

The question is not if you will ever experience a security incident, but when .

Our security specialists, who have all undergone specialised training to become Level 1 & 2 SOC analysts (Security Operations Centre), form an indispensable link in this preventive approach. In addition to a wide range of daily security responsibilities, they are responsible for continuous log monitoring and analysing daily alerts. In doing so, they carefully assess the relevance and urgency of each report. They also play a crucial role in identifying weaknesses within security systems and proposing optimisations.

Our security specialists can be deployed at companies with their own SOCs and organisations that offer these services to third parties. They have at least a bachelor's degree in IT (or equivalent) and extensive knowledge and interest in networks.

toreon_logo_wordmark copy.png

With Toreon NV as a training partner, Takto offers specialised training. This culminates in the certification path Cybrary SOC Analyst Level 1 & 2.

CORE RESPONSIBILITIES

​Our Level 1 & 2 SOC analysts can be deployed in both companies with their own SOC and organisations that offer these services to third parties. They have at least a bachelor's degree in IT (or equivalent) and have extensive knowledge and network interest.

Daily Tasks 

  • Analysing daily security alerts using a SIEM and performing triage.

  • Reviewing and fine-tuning alerts to reduce noise from false positives.

  • Monitoring and configuring security monitoring tools.

  • Conducting threat and vulnerability analysis.

Areas of Expertise & Programs

  • Threat Intelligence

  • Splunk

  • Network Monitoring

  • Vulnerability Scanning

  • Alert Tuning

  • Network Security

Additional Responsibilities (if your organisation does not have its own SOC)

  • Managing IAM and PAM systems.

  • Analysing suspicious emails and user behaviour.

  • Following up on phishing campaigns.

  • Optimising playbooks.

  • Preparing monthly reports.

  • Checking critical security updates for servers and endpoint devices.

  • Etc.

bottom of page