
Search by job, company or skills
Showing 5 jobs
Skills:
PowerShell, Bash, Network Protocols, Linux Internals, Splunk, Python, Qradar, Cymmetria, Illusive Networks, SOAR systems, honeytokens, Thinkst Canary, Active Directory, canary files, cyber deception concepts, deception frameworks, decoy systems, honeypots, Elastic, SIEM platforms, TrapX, Acalvio, OpenCanary
Skills:
threat modeling , Iso27001, Vulnerability Management, Scripting, OWASP Best Practices, Attack Signatures, Security Assessment, VM Policy Compliance Scanning Tools, CIS Benchmarks, Incident Response Triage, Industry Threat Frameworks, BSI Recommendations, API Utilization, nist, Firewall Network Link Request
Skills:
Sql, Cism, Tableau, Powerbi, Cybersecurity, Encryption, Control framework fluency, cgeit, Security risk assessments, Cloud security controls, Enterprise control frameworks, Cissp, Risk management processes, Cisa, Cloud security concepts, CRISC, Analysis
Skills:
mimecast , Servicenow, Archer, Dlp, Zscaler, Siem, Proofpoint, Jira, CSPM, Palo Alto, Splunk, web filters, email gateways, Digital Guardian, EDR, ITSM tools, Prisma, Forcepoint, Cyberhaven, SASE technologies, OneTrust, CrowdStrike, CASB, SentinelOne, GRC tools, Abnormal
Skills:
security automation , PowerShell, Python, vulnerability configuration hardening, XDR, endpoint protection, detection engineering, EDR, incident response integration, security control validation, device control solutions, response optimization
