... , Threat Hunter, or Cybersecurity Architect. Access to ongoing training and ... analysis, detection engineering, and security investigations. Basic understanding of Windows ... and ensure efficient handling of security incidents. Incident Response: Support ...
17 dni temu
... IDS/IPS, firewalls, and other security technologies. • Technical Knowledge: o ... network protocols, firewall configurations, and security frameworks (e.g., MITRE ATT&CK). • ... Utilize Networking Knowledge: Support security operations by integrating IDS/IPS ...
17 dni temu
Opis: To oferujemy Dynamiczne środowisko pracy z możliwością udziału w nowoczesnych operacjach związanych z cyberbezpieczeństwem. Dostęp do bieżących szkoleń i certyfikacji wspierających Twój rozwój zawodowy. Równowaga między życiem zawodowym a prywatnym ...
6 dni temu
... Responder, Threat Hunter, or Cybersecurity Architect. Access to ongoing training and ... , Empire, BloodHound, and cloud-native security solutions. Familiarity with APT attack ... groups. Deep knowledge of cloud security best practices across platforms like ...
10 dni temu
... IDS/IPS, firewalls, and other security technologies. • Technical Knowledge: o ... network protocols, firewall configurations, and security frameworks (e.g., MITRE ATT&CK). • ... Utilize Networking Knowledge: Support security operations by integrating IDS/IPS ...
17 dni temu
... a direct impact on the security of clients worldwide. Wymagania: ... like /r/netsec or other security-focused publications to stay ... network, and log-based security events to detect and ... of offensive and defensive security techniques, including advanced TTPs ...
17 dni temu
... a direct impact on the security of clients worldwide. Wymagania: ... like /r/netsec or other security-focused publications to stay ... network, and log-based security events to detect and ... of offensive and defensive security techniques, including advanced TTPs ...
17 dni temu
... analysis, digital forensics, or network security. Expertise in scripting or automation ... (e.g., AWS, Azure, GCP) and their security implications. Certifications such as GCIH ... using SIEM, EDR, and other security tools. Detection Development: Create and ...
17 dni temu