Skilled in collecting data from a variety of cyber defence resources.
Skilled in recognizing and categorizing types of vulnerabilities and associated attacks.
Experience detecting host and network-based intrusions using intrusion detection technologies.
Experience to interpret the information collected by network tools (e.g., nslookup, Ping, and Traceroute).
In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management, MITRE etc.
Experience in threat management and threat intelligence
Knowledge of applications, databases, middleware, Authentication, authorization, and access control methods, Cryptography, and cryptographic key management concepts
Key concepts in security management (e.g., Release Management, Patch Management),
Operating system command-line tools like PowerShell, Packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump), Network tools (e.g., ping, traceroute, nslookup), Network systems management principles, models, methods (e.g., end-toend systems performance monitoring), and tools, Windows/Unix ports and services.
Working knowledge and experience with MS office with proficiency in Excel
Understanding of how operating systems work and how exploitation works for different Operation Systems and applications.
Understanding of network traffic and be able to analyse network traffic introduced by the malware.
Thorough understanding of Windows and Linux Internals
Knowledge of common hacking tools and techniques
Experience in understanding and analysing various log formats from various sources.
Experience in analysing reports generated of SOAR/SEM tools e.g. ArcSight, Splunk, Elastic SIEM etc.
* References are also appreciated
Regards,
Kanta
9876400***
ka*************1@gm**l.com
,
Employement Category:
Employement Type: Full timeIndustry: Telecom / ISPRole Category: General / Other SoftwareFunctional Area: Not ApplicableRole/Responsibilies: Urgent hiring For SOC L3- Noida