Job Abstract

Identify misuse, malware, or unauthorized activity on monitored networks. Analyze all relevant cyber security event data and other data sources for attack indicators and potential security breaches. Assist in coordination during incidents. Identify intrusions utilizing various detection and prevention systems and other security event data sources on 24 x 7 x 365 basis. Analyze intrusion related data to determine root cause and identify follow on activity while coordinating with Incident Handlers... more details

Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.