Requirement
- Minimum of (3) three years direct Information Security experience in a security engineer, architect, consultant or a similar role, preferably with incident management experience in a SOC environment.
- Strong practical experience in Cyber security: Cyber kill chain, TTP, threat intelligence, malware triage.
- Strong understanding of Different Attacks on System, Network, Applications.
- Strong knowledge in Internet infrastructure, networking technology and network security (i.e. DNS, DHCP, Firewall, WAF, IDS, IPS, VPN, APT and TCP/IP protocols) and experience in Splunk preferred
- Comfortable with analyzing and processing large datasets and able to read and understand packet level data, handle Network/Host Security products (NIDS/NIPS, firewalls, HIPS, Proxy, AV, scanners, etc.) and understand security events from these tools.
- Insurance / Financial industry experience
- Relevant industry certifications such as certified SOC ANALYST (CSA), CISSP, CEH, GIAC Information Assurance Certified Intrusion Analyst (GCIA), GIAC Information Assurance Certified Incident Handler (GCIH), or equivalent.
- Possess strong analytical skills, self-motivated, detail oriented and team player
- Malware triage and analysis capability will be an advantage.
- Willing to learn and work in a collaborative manner with peers and team.
- Good interpersonal and communication skill.
- Able to work under pressure during critical situations.
- A passion for information security and data security.