Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Research and analyze potential cybersecurity threats across multiple systems, technologies, and environments.
- Assess risks to the organization based on research findings and recommend appropriate mitigation actions.
- Respond rapidly to cybersecurity incidents to minimize risk and ensure asset and business process integrity, confidentiality, and availability.
- Proactively monitor internal and external environments to detect potential security incidents.
- Investigate and analyze cybersecurity events using various tools and techniques.
- Support compliance-related inquiries from IT risk management, auditors, and ensure documentation meets information security policies.
- Create and present reports on cybersecurity activities, trends, and external/internal threats.
- Conduct threat hunting to identify adversary activity and vulnerabilities within the environment.
- Develop and enhance security operations detections, playbooks, and automation for effective threat response.
- Review internal logs and alerts, triage cases, and escalate as needed.
- Monitor service provider activity for security threats and analyze real-time security data for potential violations.
- Remediate compromised systems and perform breach indicator assessments.
- Assist with investigations involving internal or third-party employees.
- Stay updated with evolving threats, security techniques, tools, and industry best practices.
- Collaborate as part of a global 24/7 cybersecurity team to ensure comprehensive threat mitigation.
Key Skills
Ranked by relevanceReady to apply?
Join Largeton Group and take your career to the next level!
Application takes less than 5 minutes