Dealing with critical incidents.
Review alerts, threat intelligence, and security data.
Provide analysis and trending of security log data from a large number of heterogeneous security devices.
Provide threat and vulnerability analysis as well as security advisory services.
Male, 25 - 40 years old, majoring in Cyber Security, Information Technology or related field.
Have experience 7 years as L3 Analyst.
At least 5 years of working in the SOC.
At least have one of the following certifications (GCFA, GCFE, CISP, CISSP, CCNP, CCIE Security, or CEH).
Proficient in Incident Management and Response, handling escalations.
In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management, etc.
Strong knowledge in networking such as TCP/IP, switching/routing and cybersecurity concepts.
Communicate effectively by contributing significantly to the development and delivery of a variety of written and visual documents for diverse audiences.
Knowledge about various tools like – SIEM, SSL, Packet Analysis, HIPS/NIPS, Network Monitoring tools, Remedy, Service Now Ticketing Toolset Web Security, AV, UBEA, Advanced SOC..