Odbieraj najlepsze oferty pracy na swój adres mailowy
- ...threats and risks, including ransomware Strong working knowledge and experience with log analysis using a SIEM including writing and tuning rules for alerts, reading and interpreting logs from various platforms including Linux, Windows, and networking appliances...ZasugerowanePraca zdalnaNiepełny etatPraca z domuElastyczne godziny
- ...Architect and implement sophisticated detection strategies and correlation rules to fortify defenses against advanced threats Fine-tune and optimize log sources and correlation rules to maximize system performance and detection efficacy Identify opportunities to...ZasugerowanePraca zdalnaPraca z domuElastyczne godziny