Employer Active
FedRamp SOC Analyst
San Jose CA
Knowledge and handson experience with Splunk LogRhythm QRadar Arcsight Mcafee epo NetIQ Sentinel or any SIEM tool. Experience with Security Information Event Management (SIEM) tools creating advanced corelation rules administration of SIEM dashboard creation & rule finetuning. Should have expertise on TCP/IP network traffic and event log analysis. Knowledge on Incident Problem and Change Management. Good Knowledge on Checkpoint Cisco Fortigate PaloAlto and Sonicwall firewalls would be an added advantage. Handson experience any ticketing tools like SericeNow JIRA etc
Full Time