Rampur Portal
Overview
Governance, Data Security, Information Security, Cyber Security, Software Implementation, Monitoring, Security Operations, Risk Management, Disaster Recovery, Project Management, Vendor Management, Audit, Compliance, Incident Management, Problem Management, Change Management, Budget Planning, Procurement, Contract Management, Billing, Root Cause Analysis, Capacity Planning, IT Security Implementation, Hardware Implementation, SLA Adherence. ACTIVELY HIRING Key Skills and Areas
log analysis, threat intelligence, EDRXDR platforms, Email Security solutions, security console management, threat hunting, IOC identification, security hardening, baseline configuration, ASRM frameworks, compliance-focused security reporting, Windows Server security administration, Linux security administration, malware detection, incident response tools, cyber security, workspace, analysis, ironport, email security, security, phishing, siem/soar, proofpoint, malware, network, google security, soc, security services, ids, dlp, netmon, wireshark, firewall, linux, security management domain name system, system engineering, system administration, engineering services, personnel security, engineering management, software installation, system support, security operations Information security, IDSIPS, Firewalls, Antivirus, Network traffic analysis, Critical thinking, Documentation, Team collaboration, Continuous improvement, SOC environment, Networking fundamentals, SIEM platforms, Endpoint Detection, Response tools, VPNs, MFA solutions, Vulnerability triage, Malware identification, Phishing detection, Compromise indicators analysis, Security artifacts evaluation, Problemsolving, Verbal, written communication, Interpersonal effectiveness, Decisionmaking Network Security, Cyber Security, IDSIPS, Splunk, Cisco routers, IT controls, Vulnerability Management, Application Security, Project Management, Akamai Kona Site Defender, Palo Alto firewalls, Wireless Controllers, SolarWinds tools, BlueCoat, WAF Regulatory Compliance, Cyber Security, Data Privacy, Information Security, Communication Skills, Interpersonal Skills, Internal Policies, Industry Standards, Global Data Protection Laws, Security Frameworks, Audit Processes, Risk Assessments, Organisational Skills CISSP, CISM, Risk Assessment, Compliance Management, Security Management, Report Generation, Continuous Monitoring, Collaboration, VAPT, Controls Evaluation, Training, Awareness Market research, Client relationship management, Negotiation, Presentation skills, Analytical skills, Cybersecurity testing, Security product sales, Sales, revenue growth, Problemsolving skills Threat analysis, Malware analysis, Email security, Network analysis, SIEM, XDR, SSL, Network Monitoring tools, AV, IDSIPS, Antivirus, Threat intelligence, Intrusion detection, Response handling, Security concepts, Vulnerability analysis, Phishing Analysis, TCP/IP Protocols, Network security applications, Packet Analysis, HIPS/NIPS, ServiceNow Ticketing Toolset, Web Security, UBEA, Advanced SOC, Network protocols, Ports, common services, Endpoint detection response solutions, Cybersecurity incident response, Security Event Correlation, SOC procedures, Phishing emails analysis, Remediation activities Information Security Governance, IT Risk Management, Vulnerability Management, Patching, Regulatory Compliance, MS Office tools, Excel, Powerpoint, Cyber Compliance, Information Security policies, Information Security controls, Data Confidentiality Security, Security project management, IT Security Risk assessments, System Security Baselines, Hardening reviews, Security Configuration Assessments, Incident response management, IS Governance Program management, leading projects, power plant environments, OT/ICS Cybersecurity solutions, firewall deployments, Claroty, Secomea, Armis, Microsoft Defender for IoT, ServiceNow Change Management processes, SharePoint data access, change management concepts, risk management concepts, training, communication plans, local awareness, engagement activities Penetration testing, communication skills, malware analysis, analytical skills, reverse engineering, intelligence, perl, threat intelligence, security, problemsolving, cybersecurity, vulnerability assessments, network security technologies, security information, event management SIEM, scripting languages Python, incident response, cyber threat intelligence Firewalls, IDS/IPS, VPN, intrusion detection, analytical skills, communication skills, teamwork, firewall configurations, network protocols, Cisco, Palo Alto, Fortinet, Check Point, problemsolving skills Sign-in & Get noticed by top recruiters and get hired fast Cyber Security Related Jobs in Top Cities #J-18808-Ljbffr
Governance, Data Security, Information Security, Cyber Security, Software Implementation, Monitoring, Security Operations, Risk Management, Disaster Recovery, Project Management, Vendor Management, Audit, Compliance, Incident Management, Problem Management, Change Management, Budget Planning, Procurement, Contract Management, Billing, Root Cause Analysis, Capacity Planning, IT Security Implementation, Hardware Implementation, SLA Adherence. ACTIVELY HIRING Key Skills and Areas
log analysis, threat intelligence, EDRXDR platforms, Email Security solutions, security console management, threat hunting, IOC identification, security hardening, baseline configuration, ASRM frameworks, compliance-focused security reporting, Windows Server security administration, Linux security administration, malware detection, incident response tools, cyber security, workspace, analysis, ironport, email security, security, phishing, siem/soar, proofpoint, malware, network, google security, soc, security services, ids, dlp, netmon, wireshark, firewall, linux, security management domain name system, system engineering, system administration, engineering services, personnel security, engineering management, software installation, system support, security operations Information security, IDSIPS, Firewalls, Antivirus, Network traffic analysis, Critical thinking, Documentation, Team collaboration, Continuous improvement, SOC environment, Networking fundamentals, SIEM platforms, Endpoint Detection, Response tools, VPNs, MFA solutions, Vulnerability triage, Malware identification, Phishing detection, Compromise indicators analysis, Security artifacts evaluation, Problemsolving, Verbal, written communication, Interpersonal effectiveness, Decisionmaking Network Security, Cyber Security, IDSIPS, Splunk, Cisco routers, IT controls, Vulnerability Management, Application Security, Project Management, Akamai Kona Site Defender, Palo Alto firewalls, Wireless Controllers, SolarWinds tools, BlueCoat, WAF Regulatory Compliance, Cyber Security, Data Privacy, Information Security, Communication Skills, Interpersonal Skills, Internal Policies, Industry Standards, Global Data Protection Laws, Security Frameworks, Audit Processes, Risk Assessments, Organisational Skills CISSP, CISM, Risk Assessment, Compliance Management, Security Management, Report Generation, Continuous Monitoring, Collaboration, VAPT, Controls Evaluation, Training, Awareness Market research, Client relationship management, Negotiation, Presentation skills, Analytical skills, Cybersecurity testing, Security product sales, Sales, revenue growth, Problemsolving skills Threat analysis, Malware analysis, Email security, Network analysis, SIEM, XDR, SSL, Network Monitoring tools, AV, IDSIPS, Antivirus, Threat intelligence, Intrusion detection, Response handling, Security concepts, Vulnerability analysis, Phishing Analysis, TCP/IP Protocols, Network security applications, Packet Analysis, HIPS/NIPS, ServiceNow Ticketing Toolset, Web Security, UBEA, Advanced SOC, Network protocols, Ports, common services, Endpoint detection response solutions, Cybersecurity incident response, Security Event Correlation, SOC procedures, Phishing emails analysis, Remediation activities Information Security Governance, IT Risk Management, Vulnerability Management, Patching, Regulatory Compliance, MS Office tools, Excel, Powerpoint, Cyber Compliance, Information Security policies, Information Security controls, Data Confidentiality Security, Security project management, IT Security Risk assessments, System Security Baselines, Hardening reviews, Security Configuration Assessments, Incident response management, IS Governance Program management, leading projects, power plant environments, OT/ICS Cybersecurity solutions, firewall deployments, Claroty, Secomea, Armis, Microsoft Defender for IoT, ServiceNow Change Management processes, SharePoint data access, change management concepts, risk management concepts, training, communication plans, local awareness, engagement activities Penetration testing, communication skills, malware analysis, analytical skills, reverse engineering, intelligence, perl, threat intelligence, security, problemsolving, cybersecurity, vulnerability assessments, network security technologies, security information, event management SIEM, scripting languages Python, incident response, cyber threat intelligence Firewalls, IDS/IPS, VPN, intrusion detection, analytical skills, communication skills, teamwork, firewall configurations, network protocols, Cisco, Palo Alto, Fortinet, Check Point, problemsolving skills Sign-in & Get noticed by top recruiters and get hired fast Cyber Security Related Jobs in Top Cities #J-18808-Ljbffr