Job Description
We are seeking a highly skilled Cyber Security Manager with a strong background in security operations and implementation. The ideal candidate will have experience in the following areas:
Security Operations Center (SOC) Expertise: Proven experience as a SOC Analyst with a solid implementation background, managing security incidents and operations effectively.
SIEM Configuration: Proficiency in configuring Security Information and Event Management (SIEM) systems, with a preference for experience with AlienVault and other SIEM tools.
Cyber Threat Intelligence: In-depth knowledge of cyber threat intelligence and the ability to analyze and respond to emerging threats.
Incident Response Management: Familiarity with incident response management tools, such as TheHIVE, to facilitate efficient incident resolution.
Custom Rule Development: Experience in writing custom rules for threat detection and response.
Log Collection Expertise: Strong expertise in collecting and analyzing logs from various sources, including firewalls, servers, and other network devices.
Join our team to enhance our cyber security posture and protect our critical assets. If you have a passion for cybersecurity and a drive to stay ahead of threats, we want to hear from you!We are seeking a highly skilled Cyber Security Manager with a strong background in security operations and implementation. The ideal candidate will have experience in the following areas:
Security Operations Center (SOC) Expertise: Proven experience as a SOC Analyst with a solid implementation background, managing security incidents and operations effectively.
SIEM Configuration: Proficiency in configuring Security Information and Event Management (SIEM) systems, with a preference for experience with AlienVault and other SIEM tools.
Cyber Threat Intelligence: In-depth knowledge of cyber threat intelligence and the ability to analyze and respond to emerging threats.
Incident Response Management: Familiarity with incident response management tools, such as TheHIVE, to facilitate efficient incident resolution.
Custom Rule Development: Experience in writing custom rules for threat detection and response.
Log Collection Expertise: Strong expertise in collecting and analyzing logs from various sources, including firewalls, servers, and other network devices.
Join our team to enhance our cyber security posture and protect our critical assets. If you have a passion for cybersecurity and a drive to stay ahead of threats, we want to hear from you!