We use cookies to offer you the best possible website experience. Your cookie preferences will be stored in your browser’s local storage. This includes cookies necessary for the website's operation. Additionally, you can freely decide and change any time whether you accept cookies or choose to opt out of cookies to improve website's performance, as well as cookies used to display content tailored to your interests. Your experience of the site and the services we are able to offer may be impacted if you do not accept all cookies.
Stay Informed on Emerging Threats: Continuously monitor the threat landscape and report new vulnerabilities, including the latest CVEs and zero-day vulnerabilities.
Perform vulnerability-based risk assessments: Assess the potential impact and probability of identified vulnerabilities.
Performs technical analysis and validation of vulnerabilities
Identify false positive
Report presentation to stakeholders
Remediation Support: Track remediation efforts, train stakeholders on ARMIS-VIPR, support remediation processes, and coordinate exceptions.
Monitor Tenable Tool status and recommend corrective actions.
Security Culture: Train stakeholders on understanding and interpreting vulnerability reports.
Reporting: Automate reporting dashboards for efficient and accurate reporting.
Incident and Data Breach Handling: Handle incidents and data breaches, including ransomware and malware attacks.
Cyber Security Knowledge: Apply knowledge in cyber security frameworks such as Blue Teaming, MITRE ATT&CK Matrix, Cyber Kill Chain, and NIST CSF.
Alerts Identification and Incident Triaging: Identify false positives and triage incidents effectively.
Continuous Learning: Stay updated with the latest trends and developments in cybersecurity.
Stakeholder Reporting: Present reports to stakeholders effectively.
Team Collaboration: Be a team player and handle team responsibilities.
Threat Hunting: Conduct regular and semi-automated threat hunts, review and analyze results.
Data Analysis: Use data analysis techniques to identify potential threats.
Report Creation: Create reports for customers and internal operational use on an ongoing basis.
Broaden Detection Coverage: Identify opportunities to acquire, ingest, and analyze data and logs from additional sources and technologies.
Malware Analysis: Extend malware analysis capability and execute malware triage.
Documentation: Create and update documentation to support ongoing operations.
Collaboration with VM Analysts: Collaborate with Vulnerability Management (VM) Analysts to understand emerging threats and vulnerabilities.
Research on Cyber Threats: Conduct in-depth research on new and evolving cyber threats, vulnerabilities, and attack techniques.
Insights for VM Team: Provide insights to the VM team to enhance their ability to detect and respond to emerging threats.
Collaboration with SOC Analysts: Collaborate with SOC Analysts to monitor and analyze security alerts and events.
When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. Because we respect your right to privacy, you can choose not to allow some types of cookies. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Required Cookies
These cookies are required to use this website and can't be turned off.
Required Cookies
Provider
Description
Enabled
SAP as service provider
We use the following session cookies, which are all required to enable the website to function:
"route" is used for session stickiness
"careerSiteCompanyId" is used to send the request to the correct data center
"JSESSIONID" is placed on the visitor's device during the session so the server can identify the visitor
"Load balancer cookie" (actual cookie name may vary) prevents a visitor from bouncing from one instance to another
Functional Cookies
These cookies provide a better customer experience on this site, such as by remembering your login details, optimizing video performance, or providing us with information about how our site is used. You may freely choose to accept or decline these cookies at any time. Note that certain functionalities that these third-parties make available may be impacted if you do not accept these cookies.
Functional Cookies
Provider
Description
Enabled
YouTube
YouTube is a video-sharing service where users can create their own profile, upload videos, watch, like, and comment on videos. Opting out of YouTube cookies will disable your ability to watch or interact with YouTube videos. Cookie Policy Privacy Policy Terms and Conditions
Advertising Cookies
These cookies serve ads that are relevant to your interests. You may freely choose to accept or decline these cookies at any time. Note that certain functionality that these third parties make available may be impacted if you do not accept these cookies.
Advertising Cookies
Provider
Description
Enabled
LinkedIn
LinkedIn is an employment-oriented social networking service. We use the Apply with LinkedIn feature to allow you to apply for jobs using your LinkedIn profile. Opting out of LinkedIn cookies will disable your ability to use Apply with LinkedIn. Cookie Policy Cookie Table Privacy Policy Terms and Conditions