دوام كامل

Key Responsibilities:Analyze and investigate security alerts escalated from Tier 1 analysts to determine root cause impact and scope.Perform in-depth incident analysis using SIEM EDR network traffic analysis and log correlation.Validate true positives and classify incidents according

Key Responsibilities:Analyze and investigate security alerts escalated from Tier 1 analysts to determine root cause impact and scope.Perform in-depth incident analysis using SIEM EDR network traffic analysis and log correlation.Validate true positives and classify incidents according

قدم الآن
دوام كامل

RESPONSIBILITIESEnforce the Groups information security strategy policies standards and frameworks across the Marlink Cyber company.Develop maintain and continuously improve the Information Security Management System (ISMS) in line with ISO/IEC 27001 and other applicable standards.Ens

RESPONSIBILITIESEnforce the Groups information security strategy policies standards and frameworks across the Marlink Cyber company.Develop maintain and continuously improve the Information Security Management System (ISMS) in line with ISO/IEC 27001 and other applicable standards.Ens

قدم الآن
دوام كامل

Monitor and analyse security events across ICS/OT and network environmentsInvestigate and respond to security alerts and incidentsPerform threat analysis and contextual incident evaluationSupport Tier 1 analysts with advanced incident handlingParticipate in customer integrations and S

Monitor and analyse security events across ICS/OT and network environmentsInvestigate and respond to security alerts and incidentsPerform threat analysis and contextual incident evaluationSupport Tier 1 analysts with advanced incident handlingParticipate in customer integrations and S

قدم الآن
دوام كامل

Responsibilities: Conducting penetration tests of the infrastructure at a technical level.Proposing security improvements at a strategic and technical level.Vulnerability classification and severity determination (CVSS)Documenting and presenting findings and writing reports on the con

Responsibilities: Conducting penetration tests of the infrastructure at a technical level.Proposing security improvements at a strategic and technical level.Vulnerability classification and severity determination (CVSS)Documenting and presenting findings and writing reports on the con

قدم الآن

Key Responsibilities: Own the end-to-end talent acquisition process from requisition intake to offer acceptance.Own pre-onboarding & onboarding activities (contracts background checks employee documentation administration employee profile creation coordination with managers and IT dep

Key Responsibilities: Own the end-to-end talent acquisition process from requisition intake to offer acceptance.Own pre-onboarding & onboarding activities (contracts background checks employee documentation administration employee profile creation coordination with managers and IT dep

قدم الآن
دوام كامل

Key Responsibilities: Develop maintain and continuously improve SIEM detection rulesDesign detections based on:MITRE ATT&CK techniquesThreat intelligence and real incident learningsSupport onboarding and improvement of log sources in SIEM platformsAnalyze systems and applications to u

Key Responsibilities: Develop maintain and continuously improve SIEM detection rulesDesign detections based on:MITRE ATT&CK techniquesThreat intelligence and real incident learningsSupport onboarding and improvement of log sources in SIEM platformsAnalyze systems and applications to u

قدم الآن

Key ResponsibilitiesPreparedness & PreventionParticipate in tabletop exercises simulations and red/blue team activities.Recommend enhancements to security controls based on incident trends.Assist in vulnerability and risk assessments to strengthen overall cyber defenses.Incident Detec

Key ResponsibilitiesPreparedness & PreventionParticipate in tabletop exercises simulations and red/blue team activities.Recommend enhancements to security controls based on incident trends.Assist in vulnerability and risk assessments to strengthen overall cyber defenses.Incident Detec

قدم الآن
دوام كامل

RESPONSIBILITIESDevelopment implementation and continuous improvement of security awareness programs for external clients.Creation customization and regular updating of security education materials - e-learning modules interactive trainings presentations infographics newsletters and o

RESPONSIBILITIESDevelopment implementation and continuous improvement of security awareness programs for external clients.Creation customization and regular updating of security education materials - e-learning modules interactive trainings presentations infographics newsletters and o

قدم الآن