Serves as a contact person to users for cyber security issues, mainly engages in real-time (thresh-old) security monitoring, event evaluation, alert triage,
Serves as a contact person to users for cyber security issues, mainly engages in real-time (threshold) security monitoring, event evaluation, alert triage, and
Serves as a contact person to users for cyber security issues, mainly engages in real-time (threshold) security monitoring, event evaluation, alert triage, and
Serves as a contact person to users for cyber security issues, mainly engages in real-time (thresh-old) security monitoring, event evaluation, alert triage,
Serves as a contact person to users for cyber security issues, mainly engages in real-time (threshold) security monitoring, event evaluation, alert triage, and
Serves as a contact person to users for cyber security issues, mainly engages in real-time (threshold) security monitoring, event evaluation, alert triage, and
Job Requirements:Analyze security systems and seek improvements on a continuous basisReport possible threats or software issueResearch weaknesses and find ways