
jobsDB ref: JID200003001883943
Ref perusahaan Y2
Jobs Desription:
- Runs and review vulnerability scans and reviews vulnerability assessment reports.
- Conducts penetration tests on production systems to validate resiliency and identify areas of weakness to fix.
- Leverages emerging threat intelligence (IOCs, updated rules, etc.) to identify affected systems and the scope of the attack and explores ways to identify stealthy threats.
- Mentor and guide the First Level Security Analysts
- Provides professional data analysis within the SOC processes and to SOC customers to drive further security measures and risk mitigation activities.
- Responsible for execution and maintenance of SOC related analytical processes and tasks
- Detailed technical security reporting to customer and appropriate stakeholders
- Work closely with other Information Security teams to ensure effective intrusion detection and incident response
- Continually maintain and improve technical capabilities through individual development activities, accreditation and certifications to remain constantly prepared to challenge the ever-evolving cyber threat
- Manage services delivered by an outsourcer
- Lead some technical topics
- Expected to interact with SIEM vendors, government, authority and etc if is needed.
- Continually maintain and improve technical capabilities through individual development activities, accreditation and certifications to remain constantly prepared to challenge the ever-evolving cyber threat
- Manage services delivered by an outsource
- Lead some technical topics
- Expected to interact with SIEM vendors, government, authority and etc if is needed.
- Continually maintain and improve technical capabilities through individual development activities, accreditation and certifications to remain constantly prepared to challenge the ever-evolving cyber threat
- Manage services delivered by an outsource
- Lead some technical topics
- Expected to interact with SIEM vendors, government, authority and etc if is needed.
- Continually maintain and improve technical capabilities through individual development activities, accreditation and certifications to remain constantly prepared to challenge the ever-evolving cyber threat
Work Experience
- Solid foundation in: networking, basic cryptography, OS internals such as Windows / Linux / Mac, web basics etc.
- Experienced with network perimeter technologies, like firewalls and proxies, Intrusion Detection or Prevention Systems (IDS/IPS).
- Experience with log management and/or SIEM technologies such as Splunk, ArcSight, and LogLogic
- Experience with network monitoring tools such as RSA Netwitness, NIKSUN, Bluecoat Security Analytics.
- Broad understanding of security mitigation solutions at all layers
- Awareness of the current threat landscape
- Experience with threat hunting and threat modeling
- Excellent verbal and written communications skills
Requirements
- Bachelor's degree and a minimum of 3 to 5 years of related work experience in the fields of Computer Science, Information Systems, Engineering, or related major.
- Professional security management certification CEH or CompTIA Security+.
- Certified in Network Security studies (e.g. CCNA, CCNP).
- Excellent problem solving and troubleshooting skills with a strong attention to detail
- Ability to interact with personnel at all levels across the organization and to comprehend business imperatives
- Ability to thrive in a fast-paced environment and capable of working under pressure
- Self-driven and motivated with a strong passion for cybersecurity
If you feel that you can meet the qualification and up for the challenge, please send your complete resume and current color photograph by clicking button bellow
jobsDB akan langsung mengirimkan lamaran Anda untuk direview ke TTI GROUP DISTRIBUTION, PT
Tentang TTI GROUP DISTRIBUTION, PT
Our business solutions provide world-class anti-malware protection and offer a new, High Value approach to business IT security for companies of all sizes.
Testing of Antivirus software & examine malicious software, such as bots, worms, and trojans to understand the nature of their threat.
Ada yang mencurigakan? Silahkan lapor