Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailThe key job responsibilities include the following:
* Security monitoring
* Sentinel One Incidence response
* Security analytics
* Proactive threat hunting
* Threat Intelligence platform - consisting of Indicators of Compromise (IOC) and other threat intel (vulnerabilities strategic tactical etc.)
* User & entity behavioral Anomaly detection Vulnerability scanning and threat detection. Monitoring contemporary threats and plans to respond to those.
Assessment for the Application security /Monitoring and post assessment if feasible Service provider to perform application security monitoring.
Preferable (Nice to have) skill Relevant professional certifications such as CISSP CISM CEH or other security certifications.
The Key Skills Required.
Hands-on experience with security technologies such as firewalls IDS/IPS SIEM EDR antivirus and vulnerability scanning tools.
Must have 2 to 5 years of experience with Sentinel One. Threat Modelling Firm IT security mind-set.
Advanced knowledge about Windows Server Windows Clients Linux Server.
In-depth understanding of different types of security vulnerabilities (e.g. SQL injection XSS buffer overflow).
Understanding of attack vectors Familiarity with different network topologies and protocols such as TCP/IP DNS HTTP(S) SMTP VLANs VPNs and routing/switching.
Firm knowledge of technical details of SMTP / e-mail in general and therefore to analyse e-mail headers in order to determine additional data such as real origin etc.
Expert regarding the operation of Outlook & Exchange from a users perspective Firm grasp of phishing techniques and e-mail based attack patterns
Commitment to continuous learning. Familiarity with security-related regulations such as GDPR HIPAA and PCI-DSS.
Excellent verbal written and interpersonal communication skills especially ability to break down complex technical information to non-technical stakeholders and articulate the impact of security design flaws attack surfaces and vulnerabilities.
Full-Time