Information Security Manager
Information Security•Full Time•4-5 years•Remote•
Required Skills7 skills
Security Operations Center (SOC)
SIEM Configuration
AlienVault
Cyber Threat Intelligence
Incident Response Management
TheHIVE
Log Collection
Job Description
We are seeking a highly skilled Cyber Security Manager with a strong background in security operations and implementation. The ideal candidate will have experience in the following areas: Security Operations Center (SOC) Expertise: Proven experience as a SOC Analyst with a solid implementation background, managing security incidents and operations effectively. SIEM Configuration: Proficiency in configuring Security Information and Event Management (SIEM) systems, with a preference for experience with AlienVault and other SIEM tools. Cyber Threat Intelligence: In-depth knowledge of cyber threat intelligence and the ability to analyze and respond to emerging threats. Incident Response Management: Familiarity with incident response management tools, such as TheHIVE, to facilitate efficient incident resolution. Custom Rule Development: Experience in writing custom rules for threat detection and response. Log Collection Expertise: Strong expertise in collecting and analyzing logs from various sources, including firewalls, servers, and other network devices. Join our team to enhance our cyber security posture and protect our critical assets. If you have a passion for cybersecurity and a drive to stay ahead of threats, we want to hear from you!We are seeking a highly skilled Cyber Security Manager with a strong background in security operations and implementation. The ideal candidate will have experience in the following areas:
Security Operations Center (SOC) Expertise: Proven experience as a SOC Analyst with a solid implementation background, managing security incidents and operations effectively.
SIEM Configuration: Proficiency in configuring Security Information and Event Management (SIEM) systems, with a preference for experience with AlienVault and other SIEM tools.
Cyber Threat Intelligence: In-depth knowledge of cyber threat intelligence and the ability to analyze and respond to emerging threats.
Incident Response Management: Familiarity with incident response management tools, such as TheHIVE, to facilitate efficient incident resolution.
Custom Rule Development: Experience in writing custom rules for threat detection and response.
Log Collection Expertise: Strong expertise in collecting and analyzing logs from various sources, including firewalls, servers, and other network devices.
Join our team to enhance our cyber security posture and protect our critical assets. If you have a passion for cybersecurity and a drive to stay ahead of threats, we want to hear from you!
Recommended Jobs
4 jobs available
Dynamics 365 F&O Technical Consultant
5 positions
ConsultingFull TimeFresherRemote
.NET
SQL Server
Azure
+6 more
IT Support Executive
3 positions
Information TechnologyFull Time3-5 yearsRemote
Endpoint Management
Windows
Linux
+7 more
FullStack Developer
6 positions
EngineeringInternshipFresherRemote
FullStack
Next.js
React
Frontend Developer
6 positions
EngineeringInternshipFresherRemote
Frontend
Next.js
React