
- Monitor and analysis of SIEM events to identify potential security risks and vulnerabilities
- Triage events and investigate to identify security incidents
- Log security incidents in the IT ticketing system
- Manage security incidents throughout their lifecycle to closure
- Coordinate with other, remote technical teams to investigate, document, and resolve issues
- Make recommendations for ongoing tuning and updates to the SIEM system
- Receive input from threat intelligence sources and analyze events to identify threats and risks
- Provide support for routine reporting
- Support ad-hoc data and investigation requests
- Experience 1-5 years-Bachelor’s degree required (a combination of education and experience will be considered).
- Candidate must be willing to work on shift
- Relevant cyber security experience including SIEM operations, event management and incident management
- Demonstrated experience with security for data center technologies such as Server , Storage , Network , Security etc.
- Ability to adapt to changes in roles and responsibilities.
- Ability to work independently with limited direction in a fast-paced environment; must be a high-energy, motivated self-starter and be able to learn new technologies quickly.
- Good troubleshooting and problem solving skills.
- Good command in English both writing and speaking.
- Good customer service skills.