Job Description

Responsibilities: ● Assess, triage, and prioritize security detections from logging and monitoring systems. ● Determine the notifications that impacts Behsa operations, generate notices for appropriate teams. ● Build Splunk networking and security dashboards. ● Perform and assess vulnerability scans. ● Assess newly published vulnerabilities and attacker Tactics, Techniques and Procedure (TTPs) to identify possible defensive measures to locate and stop threat actors. ● Evaluate system, application, and user data for adherence to organizational policies and procedures. ● Tune Security tools and appliance. ● Hardening assessment. ● Use MITRE ATT&CK frame work for SOC.

Requirements

Qualifications: ● A bachelor’s degree in Computer Science, Information Systems, or a related field with security certification. ● Minimum of 5 years of experience in an information security role. ● Minimum of 2 years of experience in Security Operation environment. ● Strong understanding of security tools, technologies, and policies. ● Excellent verbal, written, and interpersonal communication skills, including the ability to communicate effectively with the IT organization, project and application development teams, management, and customers. ● In-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls. ● Experience developing and maintaining policies, procedures, standards, and guidelines. ● Expert in administration of Splunk Enterprise and Splunk Enterprise Security. ● Expert in Splunk CIM and event normalization for Splunk enterprise security. ● Expert in SPL (Splunk processing language). ● Good knowledge of industry recognized security and analysis frameworks (MITRE ATT&CK, Cyber Kill Chain, NIST, CIS.). ● Familiarity with security architecture and operational principles. ● Familiarity with WEB attacks and OWASP top 10. ● Familiarity with Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) ● An understanding of networking fundamentals, the OSI model, and TCP/IP protocols. ● Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.) ● Experienced in reviewing network, host and application audit logs (system, security, etc.)

Employment Type

  • Full Time

Details

Employment type

  • Full Time

Educations

To see more jobs that fit your career