Help uplifting the organization's security posture by:
Continuously monitoring and documenting the digital footprint of the organization, identifying blind spots and security gaps.
Contributing in the setup of solutions that improve the collection of security data across the organizational landscape.
Helping in the evaluation of on-prem and cloud deployments, encompassing all digital assets for improvement in security posture.
Proactively seeking out potential cyber threats by:
Monitoring threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs.
Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in the network and in the host as necessary.
Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPS/IDS to create and implement a concrete plan of action to harden the defensive posture.
Create and document automated controls to raise alerts on re-appearance of an indicator.
Aid SOC by:
Collaborating with the SOC Analysts to contain and investigate incidents.
Conducting red team exercises to identify possible gaps in alert configurations and incident response tactics.
Beware of fraud agents! do not pay money to get a job
MNCJobsGulf.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.