Conducts advanced threat hunting and intelligence to mitigate or eliminate security threats as well as improve the company’s security posture
Security Risk analysis & Research
Security Trend analysis / Security Investigations
Vulnerability Assessment and Penetration Testing (VAPT)
Threat Vectors & Countermeasures (POC)
Red team and Blue team
Owns the end-to-end threat hunt/s findings to resolution, including to drive solutioning working with various teams.
Provides recommendatory input for areas that needs network or security guidance and handles unresolved or escalated security issues as well as related project work.
Performs deep-dive incident analysis by correlating data from various sources; determines if a critical system or data set has been impacted; advises on remediation; provides support for new analytic methods for detecting threats.
Researches, evaluates, designs, tests, recommends, communicates, and implements new security software or devices. Implements, enforces, communicates, and may develop network security policies or security plans for data, software applications, hardware, telecommunications, and computer installations.
Safeguards the network against unauthorized modification, destruction, or disclosure.
Responsible for analyzing network security systems and/or information systems.
Use scripts and various Security tools and techniques to look for
Security issues on our networks
Hunt malicious user behavior on our network
Attempt to penetrate on our network to test level of secureness
Network & Security Solutioning
Security Tools configuration and tuning
Security Automation and Dashboards configuration
Security Architecture and Design
Conduct Security Awareness Seminars
Provide Mentorship and guidance to Junior Security Analyst
Competencies, Skills, Knowledge, and Abilities:
Experience with IT Service Management (ITSM) and the ITIL Framework
Excellent analytical and problem-solving skills
Excellent organizational, communication, documentation and project management skills
Proven ability to manage multiple priorities and drive continuous improvement
Education, Experience and Certifications Basic Requirements:
Bachelor’s degree in Computer Science or related field with 5+ years of Security Operations or 8+ Information Technology experience
and ads. By continuing to browse this site or by clicking "Accept and close", you