Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Pune |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | IT - Software |
Functional Area | General / Other SoftwareSales / BD |
EmploymentType | Full-time |
Investigate escalated alerts from SIEM (Security Information and Event Management) tools and take appropriate response actions Assist in integrating new log sources in the SIEM tool Assist in setting up additional SIEM alert rules and fine-tuning them Work with IT and business users to resolve the alertsProactive Threat Hunting Research threat activity in the wild and make recommendations to block them proactively Review Emerging Threat reports and recommend actionable steps Continuously hunt threats based on emerging Indicators of Compromise (IoCs) and tactics, techniques, and procedures in in-house network and cloud environments used by Key Skills: Location: PuneExperience: 5-8 yrsJob description:Tools required: LogRhythm - SIEM , Wireless Security, Cisco Umbrella ProxySecurity Log Monitoring Investigate escalated alerts from SIEM (Security Information and Event Management) tools and take appropriate response actions Assist in integrating new log sources in the SIEM tool Assist in setting up additional SIEM alert rules and fine-tuning them Work with IT and business users to resolve the alertsProactive Threat Hunting Research threat activity in the wild and make recommendations to block them proactively Review Emerging Threat reports and recommend actionable steps Continuously hunt threats based on emerging Indicators of Compromise (IoCs) and tactics, techniques, and procedures in in-house network and cloud environments used by,
Keyskills :
firewallcustomerrelationsidspenetrationtestingwirelesssecuritysiemcloudtacticssecurityresearchbusinesswirelesslogrhythmetwking