Monitor security events received through alerts from Azure Sentinel or other security tools.
Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies.
Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information
Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty.
Revise alerts escalated by end-users
Maintain assigned ticket queue
Job Requirements
A Bachelor’s degree in IT, or a related field of study is preferred; an MS degree is a plus.
At least 1 year of experience
Excellent English Speaker
Solid technical knowledge about TCP/IP and networking
Good Knowledge about SIEM monitoring (Preferably Azure Sentinel)
Good knowledge about IDS/IPS systems
Good knowledge about threat intelligence and defensive mechanisms
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.