You are on page 1of 3

Career Preparation Feedback Form

Unit 7: Blue Team

Candidate: Austin Urbanski


Interviewer: Kaan Night

Risk Management
Interviewer

Question Interviewer Comments

How do you ensure governance, risk, Clearly described governance, risk, and compliance and how they can be implemented
and compliance in cybersecurity?

How would you describe the use Accurately described the benefits of the NIST cybersecurity Framework
and benefits of the NIST
Cybersecurity Framework?

How do you approach intrusion Mentions


detection in cybersecurity? Define objectives - identify the scope including the assets and networks that need
monitoring

Asset inventory - create an inventory of all assets, including hardware, software, and data

Threat Intelligence - use threat intelligence to enhance the detection capabilities of your
intrusion detection systems

Network Segmentation - segmentation can help contain and prevent lateral movement
attackers
Candidate

Becoming more knowledgeable on the NIST framework

Data Analysis and Security


Question Interviewer Comments

Describe your experience using Demonstrated clear knowledge of using SIEM tools and their benefits and gave examples of
SIEM tools. What are the benefits to the different phases
using these tools?

Candidate

Getting more experience with SIEM tools would be helpful so I can give better examples of my experience with SIEM tools

Digital Forensics
Question Interviewer Comments

Explain the phases of the digital Listed all the different phases of digital forensics for example, identification, collection,
forensics investigation process. examination, analysis, documentation, presentation, review and validation, reporting, and
closure.
Question Interviewer Comments

How is data integrity verified? Mentioned checksums, hash functions, digital signatures, and data validation rules etc. and
described how you would verify them

Candidate

Give better examples of how to verify data integrity

Incident Management
Question Interviewer Comments

Explain the phases of the incident Clearly explained the phases of the incident response life cycle such as preparation,
response life cycle. identification, containment, eradication, recovery, lessons learned, documentation and
reporting, and continuous improvement. Also gave a brief description on each step.

Candidate

Have a better understanding of the incident response life cycle and be able to go more in depth on each phase

You might also like