Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Creation of USE cases using MITRE framework, Dashboard and Reports on Splunk SIEM
- Strong technical background on Network Security, Threat hunting and Risk based analysis
- Analyzing Network traffic for IPS, WAF, Firewall, DDOS and other perimeter device.
- Continuous monitoring and review of security events, reports, alerts and CSOC dashboards to identify anomalous patterns indicative of potential security incidents
- Responsible for timely and effective response to, and management of, incidents, events, notifications, calls and other activities related to CSOC including Root Cause Analysis
- Gather relevant information and provide actionable intelligence on potential cyber security threats and incidents
- Take direction and guidance from InfoSec Management to build, support and update the CSOC playbooks/processes
- Render support for the administration and configuration of security controls such as SIEM, Anti-virus software, network security devices, PAM, DLP, Vulnerability Management, etc.
- Prepare security awareness messages, presentations and announcements for management, IT staff, and regular users
- Participate in regular cyber drills and CSOC exercises
Competencies
- Adaptability/Flexibility
- Computer Skills
- Creativity/Innovation
- Decision Making/Judgment
- Dependability
- Initiative
- Integrity/Ethics
- Internet Savvy
- Managing Technology
- Personal Organization
- Planning
- Problem Solving/Analysis
- Process PRIME postings manually
- Process transaction vouchers received from various Departments (internal)
- Productivity
- Quality
- Receipt and verify the posting and payroll documents received
- Results Focus
- Self Development
- Sense of Urgency
- Strategic Thinking/Management
- Summary
- Technical Skills
- Vision and Values
- Anomaly Detection
- Authentication
- Cryptography
- Cyber Crime Trend Analysis
- Cyber Security Administration
- Cyber Security Analysis
- Cyber Security Architecture
- Cyber Security Audits
- Cyber Security Best Practices
- Cyber Security Compliance
- Cyber Security Design
- Cyber Security Governance
- Cyber Security Monitoring
- Cyber Security Planning
- Cyber Security Policy Management
- Cyber Security Regulations
- Cyber Security Risk Management
- Cyber Security Standards and Procedures
- Cyber Security Testing
- Cyber Security Threat Monitoring
- Cyber Security Tools/Products
- Cyber Threats and Attacks
- Data Analysis
- Disaster Recovery
- Encryption and Authentication
- Encryption/Decryption
- Event Monitoring/Log Analysis
- Fault Diagnosis/Isolation/Detection
- Firewall Management
- Hacking Countermeasures
- Incident Response
- Incidents Reporting
- Intrusion Detection
- Intrusion Detection Systems
- Malware Analysis
- Network Forensics
- Network Protocols
- Network Topologies
- Penetration Testing
- Threat Containment
- Vulnerability Assessments
- Bachelor’s degree in Computer Science or equivalent
Key Skills
Ranked by relevanceReady to apply?
Join Commercial Bank and take your career to the next level!
Application takes less than 5 minutes