Monitoring and analysis of network and system events in relation to anomalies and compromises
Evaluation and tracking of security alerts from a wide variety of detection engines
Proactive search of log events (threat hunting) for Indicators of Compromises (IOCs), malware artifacts and threat intelligence from security alerts
Processing of security incidents and initiation of incident response measures
Further development of the technical measures for threat detection (further development of the cyber security solution landscape)
Evaluation and cross-team management of current CERT vulnerability reports
ou protect the company from hacker attacks and are also responsible for technical security
Implementation of worldwide security awareness campaigns
Responsibility for incident response and threat hunting in the event of cyber security threats
You work closely with the internal Security Operations Center and support the implementation of audits
The continuous development of security processes as well as the research of the latest solutions and technologies in the IT security area are part of your daily tasks.
Requirements
You have a degree in computer science or a similar field, and ideally have completed further training in the area of IT security.
You have several years of professional experience with a focus on IT security.
You have a structured way of working.
Professional experience in the field of IT security with a focus on Microsoft products.
Good knowledge of the network and IT security solution landscape (NG firewall, endpoint detection & response, SIEM/log management).
Good knowledge of Microsoft products (Defender ATP, Windows Server).
Clear, factual and binding communication with customers, employees, colleagues and superiors.
Structured way of working and ability to use resources efficiently.
proven experience with Microsoft 365 admin, end point management tools and also saas applications.
إخلاء المسؤولية: د.جوب هو مجرد منصة تربط بين الباحثين عن عمل وأصحاب العمل. ننصح المتقدمين بإجراء بحث مستقل خاص بهم في أوراق اعتماد صاحب العمل المحتمل.
نحن نحرص على ألا يتم طلب أي مدفوعات مالية من قبل عملائنا، وبالتالي فإننا ننصح بعدم مشاركة أي معلومات شخصية أو متعلقة بالحسابات المصرفية مع أي طرف ثالث. إذا كنت تشك في وقوع أي احتيال أو سوء تصرف، فيرجى التواصل معنا من خلال تعبئة النموذج الموجود على الصفحة اتصل بنا