Upvote
Downvote
IT Security Operations: Cyber Security Moniotirng Analyst
Share Job
- Suggest Revision
- Security infrastructure implementation, monitoring/analytics support of perimeter network security devices including Firewalls, IPS/IDS, Proxy, Application Security
- Work alongside/within a group of technical security staff responsible for the security infrastructure, implementation of perimeter network security devices such as Firewalls, IPS/IDS, VPN, Proxy, DLP, Two factor authentication technology and Wireless Security, and Security Enforcement activities.
- Provide tier 1 and tier 2 security operation and event support, real-time monitoring & analytics on both perimeter and internal infrastructure, monitor application security events and administer associated security tools.
- These tools include but are not limited to Security Events and Incident Management (SIEM) tools, firewall traffic monitoring tools, IDS / IPS tools, DLP, Proxy Server, and applications such as I-DAP, AD, Email, MDM etc.
- Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security, NAC, Enterprise ID Management systems, Database, computer systems, security event analysis and forensic investigations.
Active Job
Updated TodaySimilar Job
Relevance
Active