Technical consultant
Ability in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots, decoys, and other security tools.
Developing knowledge on log collection mechanism such as Syslog, Log file, DB API.
Developing knowledge in security architecture.
Developing knowledge in ETL concepts, data processing...