https://bayt.page.link/8QGGsKrHibpbTNsZ7
Create a job alert for similar positions

Job Description


Threat Defense Operations & Incident Response Manager
Specialist Skills / Technical Knowledge Required for This Role:
• Knowledge of banking and financial processes and technologies/workflow
• Strong knowledge in information security processes, services, and systems
• Strong knowledge of threat hunting techniques, zero-day exploit activities, and malware identification
• Strong knowledge of network monitoring and network exploitation techniques
• Strong experience in Microsoft Sentinel architecture, administration, Use Case development and deployment. Kusto query language (KQL) experience is a must.
• Proven experience in assessing, designing, deploying, and operating SIEM platforms.
• Strong knowledge of SIEM configuration requirements and logic
• Knowledge of ISO 27001, NESA, PCI DSS, SWIFT and other security standards, and regulations
• Bachelor’s degree in computer science, Engineering, IT, or a related technical discipline
• Must be certified in at least three of the following certifications: Microsoft AZ-500, SC-200, SC-300, SC-100, EC-council CTIA, CSA, GCIA, GCIH, CISSP
Previous Experience: 
• 7-9 years of experience in performing information security threat hunting and SIEM administration/Architecture in large international banks or financial institutions
• Experience with scripting/programming, exploitation techniques and use case development.
• Experience with common attack vectors and IOC datasets
• Experience with SIEM configuration logic development
• Proficient in Kusto query language (KQL) and experienced in developing use cases.
 

You have reached your limit of 15 Job Alerts. To create a new Job Alert, delete one of your existing Job Alerts first.
Similar jobs alert created successfully. You can manage alerts in settings.
Similar jobs alert disabled successfully. You can manage alerts in settings.