Security monitoring and analysis: Utilize security tools and techniques to monitor and analyze security events and trends. Identify patterns and proactively implement measures to enhance security.
Stay updated with the latest trends and technologies: Demonstrate a passion for cybersecurity and a commitment to staying updated with the latest trends, threats, and technologies in the field. Continuously expand your knowledge and skills to contribute effectively to our security initiatives.
Demonstrated a proven track record of utilizing QRadar (SIEM) and Carbon Black (EDR) to expertly monitor security alerts, significantly improving threat detection and mitigation capabilities.
Streamlined the security alert investigation process by effectively reducing response times through diligent triaging and in-depth analysis, resulting in faster incident resolution.
...
Demonstrated a proven track record of utilizing QRadar (SIEM) and Carbon Black (EDR) to expertly monitor security alerts, significantly improving threat detection and mitigation capabilities.
Streamlined the security alert investigation process by effectively reducing response times through diligent triaging and in-depth analysis, resulting in faster incident resolution.
...
Security Operations: Contribute to the daily operations of the SOC, monitoring security alerts, investigating anomalies, and escalating critical incidents to the appropriate team members.
Security Awareness & Training: Develop and deliver security awareness training programs to educate employees on best practices for identifying and preventing cyber threats.
Vulnerability Management: Assist in identifying, prioritizing, and patching vulnerabilities within the IT infrastructure.
...
Serve as a technical escalation resource for other SOC Analysts and provide mentoring for junior team members’ skill development
Act as an incident responder for the Security Operations Center, leading technical investigations of security incidents and providing customers security expertise
Conducting cyber threat research and analysis for purposes of improving visibility and development of the SIEM use case library and playbooks
...
Security Operations: Contribute to the daily operations of the SOC, monitoring security alerts, investigating anomalies, and escalating critical incidents to the appropriate team members.
Security Awareness & Training: Develop and deliver security awareness training programs to educate employees on best practices for identifying and preventing cyber threats.
Vulnerability Management: Assist in identifying, prioritizing, and patching vulnerabilities within the IT infrastructure.
...
Our client, a leading company in the cybersecurity industry, is seeking a highly skilled and experienced Security Analyst to join their dynamic team. This is an excellent opportunity for a professional with a minimum of 5 years of experience in Endpoint Security, Web Application Firewall, Email Security, and Web Security.
...
Day to day triaging ticket alerts, analyzing using threat intelligence and escalating when required
Serve as a technical escalation resource for other SOC Analysts and provide mentoring for junior team members’ skill development
Act as an incident responder for the Security Operations Center, leading technical investigations of security incidents and providing customers security expertise
...
Participate in regular threat focus meetings with fellow SOCs
Perform detailed investigative works into all traffic anomalies against established, historical baselines of individual agencies. Reviewing and profiling the events of all monitored clients
Assist the Security Analysts with the investigative works
...
Produce actionable intelligence information for delivery to colleagues and customers in the form of technical reports, briefings, and data feeds
Participate in regular threat focus meetings with fellow SOCs
Perform detailed investigative works into all traffic anomalies against established, historical baselines of individual agencies. Reviewing and profiling the events of all monitored clients
...
Monitor and report on all security related alerts, incidents and breaches and provide assistance in the investigation and resolution of security incidents, when required
Investigate phishing/spam emails reported by users.
...
This is a full-time on-site role for a Cyber Security Analyst/Engineer at VireServe. The role involves various day-to-day tasks related to cyber security, including application security, malware analysis, network security, and ensuring overall cyber resilience.
Qualifications
Strong knowledge and experience in Cybersecurity
...
Ensure that all Infrastructure related procedures, operation guide, architecture diagram, hardening baselines, security metrics, etc documents shall be reviewed annually or updated whenever there are changes within a month.
Be responsible for strengthening Customer’s cyber security posture against cyber threats through vulnerability management, incident response and analysis, threat hunting and security operations.
Manage Customer’s Cyber security operation and manage the reporting and handling of cyber security incidents.
...
We are seeking a highly skilled and experienced HashiCorp Expert to join our dynamic team. As a HashiCorp Expert, you will play a key role in designing, implementing, and maintaining infrastructure solutions using HashiCorp tools such as Terraform, Vault, Consul, and Nomad. You will be responsible for ensuring the scalability, security, and efficiency of our infrastructure through the effective use of HashiCorp technologies.
Be responsible for strengthening Customer’s cyber security posture against cyber threats through vulnerability management, incident response and analysis, threat hunting and security operations.
Manage Customer’s Cyber security operation and manage the reporting and handling of cyber security incidents.
Perform Vulnerability Management leveraging on MVMS.
...
Infrastructure as Code (IaC): Utilize Terraform to define and manage infrastructure as code, enabling efficient provisioning and scaling of resources.
Secrets Management: Implement and manage secure secrets using HashiCorp Vault, ensuring the confidentiality and integrity of sensitive information.
Service Discovery and Orchestration: Leverage Consul for service discovery and Nomad for workload orchestration, ensuring seamless deployment and scaling of applications.
...
This role involves protecting computer systems and networks from unauthorized access, preventing disclosure of sensitive information, disruption, modification, or destruction of IT assets and information of the business. You will be responsible to safeguard data through usage of several tools including firewalls, antivirus software, intrusion detection systems, and encryption technologies
Job Responsibilities:
Incident Response and Operations: Support cyber security incident response efforts, ensuring rapid and effective response to security breaches.
...