Generic Responsibilities
- Deploys and configures various security technologies such as firewalls intrusion detection/prevention systems encryption mechanisms antivirus software and access control systems to protect the infrastructure and the network.
- Analyzes new logs correlation rules maintains existing rules and different components of the SIEM alerting GUI (Dashboard Alerting etc.) to enable a dignosis of malicious codes (e.g. Sandbox or manually).
- Handles tickets qualifies the security incidents and determines the scope of compromising data or components.
- Monitors the network and systems for any signs of security breaches or unauthorized access attempts to maintain the security infrastructure in operational condition with a view to quality productivity and security.
- Ensures the proper functioning and planning of technical platforms and availability of technical resources.
- Plans penetration tests on computer systems networks web-based and mobile applications and selects and creates the appropriate tools for testing.
- Conducts vulnerability assessments and penetration testing by simulating attacks to identify weaknesses and vulnerabilities in systems and applications.
- Gathers data from all stages analyzes outcomes and makes recommendations to mitigate vulnerabilities and reports on the findings to SOC analysts.
- Actively engages in and apply various development methodologies to effectively collaborate contribuiting for successful delivery as well as improving the development process.
- Keeps up-to-date with the Industry and best practice trends using insights to implement new processes and initiatives in the organization.
Specific Responsibilities
- Investigates and analyzes security incidents in levels 1 and 2 collects technical data identifies the root cause and severities and takes corrective measures to mitigate the impact and prevent future incidents.
- Participates in the installation of security infrastructures configuration and validation of security infrastructure components.
- Investigates and analyzes security incidents in levels 1 and 2 collects technical data identifies the root cause and severities and takes corrective measures to mitigate the impact and prevent future incidents.
- Participates in the installation of security infrastructures configuration and validation of security infrastructure components.
Qualifications :
- One or more of following programing languages and scripting languages (Python JavaScript C C Assembler Shell)
- Knowledge of SIEM solutions
- Experience with Splunk search syntax and Regex
- Operating system : Unix Linux Windows Android/IOS
- System security vulnerabilities and remediation techniques including how system processes are working
- Network protocols TCP/IP routing IPsec and VPN
- Good knowledge on Internet application protocols weaknesses and vulnerabilities: HTTPS SMTP DNS NTP LDAP SIP SAMBA SSH etc
- Internet architecture definition
- Vulnerability analysis and assessment tools
- Penetration testing methods and tools especially Web exploits (injections SQL XSS/CSRF etc.)
- Static and dynamic analysis tools (ollyDBG windbg immunity debugge x64dbg IDA)
- Cyberattacks and counter-measures (network system application)
- Application vulnerabilities (web browser office application web servers database etc.)
- Firewalls - Palo Alto Fortinet Checkpoint
- Proxy & Reverse Proxy - McAfee Web Gateway R&S
- Cisco ISE
- One or more of following programing languages and scripting languages (Python JavaScript C C Assembler Shell)
- Knowledge of SIEM solutions
- Experience with Splunk search syntax and Regex
- Operating system : Unix Linux Windows Android/IOS
- System security vulnerabilities and remediation techniques including how system processes are working
- Network protocols TCP/IP routing IPsec and VPN
- Good knowledge on Internet application protocols weaknesses and vulnerabilities: HTTPS SMTP DNS NTP LDAP SIP SAMBA SSH etc
- Internet architecture definition
- Vulnerability analysis and assessment tools
- Penetration testing methods and tools especially Web exploits (injections SQL XSS/CSRF etc.)
- Static and dynamic analysis tools (ollyDBG windbg immunity debugge x64dbg IDA)
- Cyberattacks and counter-measures (network system application)
- Application vulnerabilities (web browser office application web servers database etc.)
- Firewalls - Palo Alto Fortinet Checkpoint
- Proxy & Reverse Proxy - McAfee Web Gateway R&S
- Cisco ISE
Additional Information :
Our workplace reflects the vibrant spirit of our locations with initiatives such as a Green Transportation Budget electric bikes and a flexible Hybrid Work Policy. We promote wellbeing through the Honolulu Wellness Club a Prayer Room a Lactation Room and themed Villages that inspire creativity and collaboration. Through our ESG and DEI strategies we are commit to being inclusive caring and fair ensuring every voice is heard and valued.
Remote Work :
No
Generic ResponsibilitiesDeploys and configures various security technologies such as firewalls intrusion detection/prevention systems encryption mechanisms antivirus software and access control systems to protect the infrastructure and the network.Analyzes new logs correlation rules maintains existi...
Generic Responsibilities
- Deploys and configures various security technologies such as firewalls intrusion detection/prevention systems encryption mechanisms antivirus software and access control systems to protect the infrastructure and the network.
- Analyzes new logs correlation rules maintains existing rules and different components of the SIEM alerting GUI (Dashboard Alerting etc.) to enable a dignosis of malicious codes (e.g. Sandbox or manually).
- Handles tickets qualifies the security incidents and determines the scope of compromising data or components.
- Monitors the network and systems for any signs of security breaches or unauthorized access attempts to maintain the security infrastructure in operational condition with a view to quality productivity and security.
- Ensures the proper functioning and planning of technical platforms and availability of technical resources.
- Plans penetration tests on computer systems networks web-based and mobile applications and selects and creates the appropriate tools for testing.
- Conducts vulnerability assessments and penetration testing by simulating attacks to identify weaknesses and vulnerabilities in systems and applications.
- Gathers data from all stages analyzes outcomes and makes recommendations to mitigate vulnerabilities and reports on the findings to SOC analysts.
- Actively engages in and apply various development methodologies to effectively collaborate contribuiting for successful delivery as well as improving the development process.
- Keeps up-to-date with the Industry and best practice trends using insights to implement new processes and initiatives in the organization.
Specific Responsibilities
- Investigates and analyzes security incidents in levels 1 and 2 collects technical data identifies the root cause and severities and takes corrective measures to mitigate the impact and prevent future incidents.
- Participates in the installation of security infrastructures configuration and validation of security infrastructure components.
- Investigates and analyzes security incidents in levels 1 and 2 collects technical data identifies the root cause and severities and takes corrective measures to mitigate the impact and prevent future incidents.
- Participates in the installation of security infrastructures configuration and validation of security infrastructure components.
Qualifications :
- One or more of following programing languages and scripting languages (Python JavaScript C C Assembler Shell)
- Knowledge of SIEM solutions
- Experience with Splunk search syntax and Regex
- Operating system : Unix Linux Windows Android/IOS
- System security vulnerabilities and remediation techniques including how system processes are working
- Network protocols TCP/IP routing IPsec and VPN
- Good knowledge on Internet application protocols weaknesses and vulnerabilities: HTTPS SMTP DNS NTP LDAP SIP SAMBA SSH etc
- Internet architecture definition
- Vulnerability analysis and assessment tools
- Penetration testing methods and tools especially Web exploits (injections SQL XSS/CSRF etc.)
- Static and dynamic analysis tools (ollyDBG windbg immunity debugge x64dbg IDA)
- Cyberattacks and counter-measures (network system application)
- Application vulnerabilities (web browser office application web servers database etc.)
- Firewalls - Palo Alto Fortinet Checkpoint
- Proxy & Reverse Proxy - McAfee Web Gateway R&S
- Cisco ISE
- One or more of following programing languages and scripting languages (Python JavaScript C C Assembler Shell)
- Knowledge of SIEM solutions
- Experience with Splunk search syntax and Regex
- Operating system : Unix Linux Windows Android/IOS
- System security vulnerabilities and remediation techniques including how system processes are working
- Network protocols TCP/IP routing IPsec and VPN
- Good knowledge on Internet application protocols weaknesses and vulnerabilities: HTTPS SMTP DNS NTP LDAP SIP SAMBA SSH etc
- Internet architecture definition
- Vulnerability analysis and assessment tools
- Penetration testing methods and tools especially Web exploits (injections SQL XSS/CSRF etc.)
- Static and dynamic analysis tools (ollyDBG windbg immunity debugge x64dbg IDA)
- Cyberattacks and counter-measures (network system application)
- Application vulnerabilities (web browser office application web servers database etc.)
- Firewalls - Palo Alto Fortinet Checkpoint
- Proxy & Reverse Proxy - McAfee Web Gateway R&S
- Cisco ISE
Additional Information :
Our workplace reflects the vibrant spirit of our locations with initiatives such as a Green Transportation Budget electric bikes and a flexible Hybrid Work Policy. We promote wellbeing through the Honolulu Wellness Club a Prayer Room a Lactation Room and themed Villages that inspire creativity and collaboration. Through our ESG and DEI strategies we are commit to being inclusive caring and fair ensuring every voice is heard and valued.
Remote Work :
No
View more
View less