Protecting enterprise systems and information by promptly responding to security threats and incidents, acting individually and as part of a team to resolve issues Proactively hunting for threats and enacting identification, containment, and eradication measures while supporting recovery efforts Penetration testing and Vulnerability Management Management of Application Whitelisting product Analyze and respond to threats from e-mail security applications Analyzing cyber security incidents to solve issues and improve incident handling procedures Conducting research regarding the latest methods, tools, and trends in cyber threat intelligence Creating thorough reports and documentation of all incidents and procedures
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Industry
Credit Intermediation and Related Activities
Education Level
Associate degree
Number of Employees
1,001-5,000 employees