Key Responsibility:

  • Experienced in SIEM Administrator Proficient in threat hunting, malware analysis, and SIEM tools. Skilled in delivering actionable intelligence to enhance organizational security posture.
  • implementing and managing SIEM solutions to ensure enterprise-level cybersecurity.
  • Proficient in security incident monitoring, log analysis, and threat detection to minimize risks and enhance system resilience.
  • Skilled in integrating and customizing SIEM tools to meet organizational needs and regulatory compliance requirements.

Requirements:

  • B.Sc. in Computer /IT/Electronics Eng. /Science.
  • Minimum eight (8) years of experience in IT.
  • At least five (5) years’ experience in SOC operations.
  • At least three (3) years’ experience in FortiGate firewalls -forti-analyzer, Forti-SIEM and Forti-SOAR.
  • Hands-on experience deploying, managing, or tuning SIEM platform (e.g., Google SecOps / Chronicle, Splunk, QRadar, or Azure Sentinel) in production environments.
  • Demonstrable proficiency with Google Cloud services, security tooling, and related APIs (e.g., Security Command Center, IAM, Cloud Logging, Cloud Functions).
  • Strong experience and knowledge of security threats, incident response using incident management systems.
  • Strong experience in operational work which includes but not limited to Administrate, operate, monitor, manage SIEM platform and collecting raw data as well as reviewing alarms and alerts, and regula activities of ensuring the health of log sources, parsers, alerts, reports etc.
  • Strong experience in developing content for a complex and growing SIEM infrastructure. This includes cases, dashboards, active channels, reports, rules, filters, and trends.
  • In depth experience in tracking and resolving security incidents on regular frequencies and collaborating with other teams for resolution and suggest areas for improvement.
  • Strong experience in fine-tuning of security solutions to reduce the occurrence of false positive and false negative alerts.
  • Strong experience in Malware analysis, Log Analysis and Correlation as well as Cloud Security (AWS, Azure, GCP).
  • In depth experience in designing and implementing strategies to contain and recover from an incident.
  • Proven experience in proactively identifying possible threats, security gaps and vulnerabilities that might be unknown. Technical and Professional Qualifications & Certifications.


The following Professional Certifications are mandatory and should be met:

  • Certified SOC Analyst (C|SA).
  • Certified Etherical Hacking (CEH VI 1 or higher).
  • NSE technical certification 5 (Forti-SIEM).
  • NSE 6 technical certification 6 (Forti-SOAR).


# Only The Relevant Application Will Be View, And For the Relevant Candidate Please Attach Your Updated Resume & Bachelor Degree Certificate and a copy of Your Professional Certificates in Order To Arrange the Interview.

You Can Send Also To Email :- [Click to show email]

Post date: Today
Publisher: LinkedIn
Post date: Today
Publisher: LinkedIn