Hybrid Manager – Threat Hunting, Information Security Group

Posted yesterday

Apply now

About the role

  • Manage security event monitoring and incident response using SIEM platforms, with preference for Azure Sentinel and ArcSight.
  • Analyze and respond to security events from diverse sources such as firewalls, IDS/IPS, antivirus solutions, DAM systems, web servers, proxies, and banking applications.
  • Develop and maintain alert rules and logic within SIEM to ensure accurate detection of security events.
  • Assist senior personnel in managing complex security incidents and improving incident response times.

Requirements

  • Educational Background: Graduate/Postgraduate degree in Science, Engineering, or IT.
  • Certifications: Minimum of 2 Professional certifications from CISSP, CISM, CRISC, CISA, or equivalent.
  • Experience: Proficient in SIEM Policy reviews and implementation, with experience in Cyber Defense Center or Security Operations Center roles.
  • Over 10 years of experience in SOC & CDC, with strong analytical skills and experience in managing security operations.
  • Skills: Proficiency in SIEM design and implementation.
  • Ability to work with various teams to enhance security awareness.
  • Strong documentation and report writing skills.
  • Knowledge of the banking environment is advantageous.

Benefits

  • Health insurance
  • Retirement plans
  • Paid time off
  • Flexible work arrangements
  • Professional development opportunities

Job title

Manager – Threat Hunting, Information Security Group

Job type

Experience level

SeniorLead

Salary

Not specified

Degree requirement

Postgraduate Degree

Tech skills

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job