This is a dictionary of vulnerabilities in published operating systems and applications software
CVE or NVD
SLA
Service Level Agreement
Can't figure out what command to type cause you're so use to Linux commands, just use this command to find them translated from UNIX to PowerShell
Get-Alias
Looking at logs all day. Maybe cooking up some playbooks. Maybe even doing some malware analysis
SOC/Cybersecurity Analyst
This chain offers it fresh, never frozen
Wendy's
This technology collects IDS alerts and host logs from sources, then performs correlation analysis to identify indicators
SIEM
CIA
confidentiality, integrity, and availability
Used for PowerShell remoting, can be used as either ad-hoc commands (small, one off expressions) or interactive sessions. Not malicious by itself unless you know there shouldn't be any remote commands of PowerShell in an organization.
Invoke-Command
Configure firewalls, VPNs, Cisco stuff, Palo Alto stuff
Network Engineer (or net admin)
An American pop rock band known for hits such as Radioactive
Imagine Dragons
This type of authentication process is used at the bank with an ATM card
Two-Factor (Multi)
HIPAA
Health Insurance Portability and Accountability Act
Can't use Cat, but you can use this
Get-Content
Researches and analyzes emerging cyber threats
Threat Hunter (threat intelligence analyst)
A convention centered around a tool used for cutting wood
Saw Con
This is a physical control that prevents "piggybacking" or "tailgating," when an unauthorized person follows an authorized person into a controlled area
Turnstile (mantrap)
GNU
GNU's Not Unix
You can use curl like a normal person. But if you ain't normal so you'd use
Invoke-WebRequest
As Billie Eilish would say, I'm the bad guy
Pen tester (red teamer)
A telepath orc
Mind Goblin
A network area that is designed to be accessed by outside visitors but is still isolated from the private network of the organization. email, public web, file servers
DAC
Discretionary Access Control
A PowerShell cmdlet that executes strings as PowerShell commands or expressions. It takes a string containing PowerShell code and runs it as if you had typed it directly into the PowerShell console. Can be dangerous because it executes arbitrary code
Invoke-Expression (iex)
You are the lawyer version of cybersecurity
GRC Analyst (Compliance analyst/officer works too)
This service is open 24/7, accepts everyone regardless of background, and has a revolving door policy. Although there is typically line.
Your Mom