Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Handle and validate incidents/Alerts
- Receive and analyze Security alerts from various sources and determine possible causes of such alerts.
- Conduct recommended proactive response actions and predictive analysis of potential cybersecurity threats.
- Use SOC tools for continual monitoring and analysis of System/Network/Application activity to identify potential malicious activities.
Experience:
- Minimum 1 to 2 year experience working in a large-scale IT environment with focus on SIEM Solution. Preferably Splunk & ArcSight.
- High-level understanding of current security threats & challenges in mitigating those.
- Knowledge of security best practices and concepts.
- Knowledge of Windows and/or Unix-based systems/architectures and related security.
- Intermediate level of knowledge of LAN/WAN technologies.
- Must have a solid understanding of information technology and information security.
Characteristics:
- Flexibility to work all shifts on 24x7 basis and willingness to assist the team with overtime when needed.
Key Skills
Ranked by relevanceReady to apply?
Join TAGMATIX360 and take your career to the next level!
Application takes less than 5 minutes