Observing and examination (Tier 1) of SOC security apparatuses, for the most part SIEM, chasing digital dangers (chasing), investigation of security alarms.
Read More: it security engineer
Observing of security apparatuses, for example, SIEM, antivirus, EDR, firewalls, Database Firewall, WAF,
IPS, weaknesses.
Thoughtfulness regarding first level help tickets.
Location of various assault vectors that demonstrate noxious action (chasing).
Heightening of vindictive exercises to second-level experts.
The board of tagging devices to take care of cases.
Age of reports of the SOC apparatuses, just as their translation/suggestion.
Post prerequisites
For TrustDimension, the planning and information gained by our group is significant. The ideal necessities for the great presentation of the exercises are:
Computer Systems Engineer/Bachelor's Degree in Information Security
Least 1 to 2 years experience as first or second level Technical Support Engineer, Computer Security Analyst
Information on security arrangements, for example, RSA Netwitness, Imperva DBF, McAfee ePO, CISCO IPS, CrowdStrike, TrapX, Cyberintelligence.
Information on Windows, Linux Operating Systems
Alluring Cisco CCNA Security and/or CCNP Security Certification
Halfway information on Ethical Hacking
Observing of security apparatuses, for example, SIEM, antivirus, EDR, firewalls, Database Firewall, WAF,
IPS, weaknesses.
Thoughtfulness regarding first level help tickets.
Location of various assault vectors that demonstrate noxious action (chasing).
Heightening of vindictive exercises to second-level experts.
The board of tagging devices to take care of cases.
Age of reports of the SOC apparatuses, just as their translation/suggestion.
Post prerequisites
For TrustDimension, the planning and information gained by our group is significant. The ideal necessities for the great presentation of the exercises are:
Computer Systems Engineer/Bachelor's Degree in Information Security
Least 1 to 2 years experience as first or second level Technical Support Engineer, Computer Security Analyst
Information on security arrangements, for example, RSA Netwitness, Imperva DBF, McAfee ePO, CISCO IPS, CrowdStrike, TrapX, Cyberintelligence.
Information on Windows, Linux Operating Systems
Alluring Cisco CCNA Security and/or CCNP Security Certification
Halfway information on Ethical Hacking
ITIL information
No comments:
Post a Comment