Search Results: 1 vacancy
...activities while on-call
We would love to hear from people with
• Demonstrated technical knowledge of security log aggregation and/or security intelligence monitoring systems
• Strong analytical skills in threat, vulnerability, endpoint detection analysis...
Suggested