This week’s 50 hours consisted of much more of the same things. I began to
become a bit frustrated that I was required to do the same old tasks and deal with
the same basic tickets, so I went to my manager and asked if he had any tasks that
may have a bit more importance. He informed me that I do not have the proper
requirements to be able to do certain things with the security team due to my lack
of a “top secret clearance”. Although I could not get hands o with some of the real
deal tools I did get to shadow one of his team members. I was able to get more
information on the Nessus vulnerability scan and the protocols they follow upon
receiving the reports. From what I understand, these reports and vulnerabilities
require a whole bunch of research in hopes to mitigate the vulnerabilities. Majority
of the time, things that come in from these reports are things that the team has
never seen and must do extensive research in order to mitigate them and keep the
network safe. You would think there is some special research database these
professionals use but that is not necessarily the case. They take the codes and the
results of the vulnerability scanner and simply use the same interfaces we do such
as our web browsers and google. Once they find some good reliable research the
whole team comes together and talk about the results they found in a Microsoft
teams meeting. Teams meetings are very popular in the cyber field. Along with
this, I continued to work on my basic tickets. While the security tickets I had the
ability to work on were more user support based such as bitlocker recovery,
password issues, and email scams. I learned the difference between user based and
infrastructure with the security team being much more infrastructure based by
keeping the entire network safe and protected.