are a plus (SEC+, CEH, GCIH, GCFA, OSCP etc.) Experience with: Security Event Detection, Triage, Analysis, and Response... Sentinel, AlienVault, NetWitness, ArcSight, McAfee ESM Experience with Endpoint Protection platforms is preferred...
monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat... detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control, SSH key management, and secure file...
such as Event Viewer, SCOM, Nagios, or Grafana. Familiar with endpoint protection and threat detection tools such as CrowdStrike... and Microsoft Defender for Endpoint. Strong knowledge of user access control, Active Directory, Group Policy, and secure file...
Forcepoint, McAfee, Digital Client Desirable Working knowledge of: Firewalls, VPNs, IDS Endpoint Detection & Response..., and endpoint environments. Develop and enforce DLP policies and operational playbooks. Integrate threat intelligence to evolve...
monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat... detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control, SSH key management, and secure file...
such as Event Viewer, SCOM, Nagios, or Grafana. Familiar with endpoint protection and threat detection tools such as CrowdStrike... and Microsoft Defender for Endpoint. Strong knowledge of user access control, Active Directory, Group Policy, and secure file...
such as Event Viewer, SCOM, Nagios, or Grafana. Familiar with endpoint protection and threat detection tools such as CrowdStrike... and Microsoft Defender for Endpoint. Strong knowledge of user access control, Active Directory, Group Policy, and secure file...
monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat... detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control, SSH key management, and secure file...
monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat... detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control, SSH key management, and secure file...
monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat... detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control, SSH key management, and secure file...
monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat... detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control, SSH key management, and secure file...
monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat... detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control, SSH key management, and secure file...
monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat... detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control, SSH key management, and secure file...
monitoring using tools such as Event Viewer, SCOM, Nagios, or Grafana. Familiar with endpoint protection and threat detection... tools such as CrowdStrike and Microsoft Defender for Endpoint. Strong knowledge of user access control, Active Directory...
monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat... detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control, SSH key management, and secure file...
. Implementing security protocols: Developing and enforcing security policies, including firewalls, intrusion detection systems... network architecture and endpoint devices. Requirements: Active TOP SECRET w/SSBI (within 5 years) required. SCI eligibility...
, threat detection, vulnerability management, and third-party/vendor security risk management. Ensure the selection..., configuration, and ongoing management of security tools and processes such as SIEM, endpoint protection, firewalls, and cloud...