, proactively identifying bottlenecks and driving architectural improvements. Own incident management, including detection... management (detection → triage → mitigation → RCA/post-mortem), system health monitoring, performance analysis, scalability...
platforms. Ensure timely detection, triage, and resolution of security incidents. Coordinate incident response activities... in incident response, threat hunting, and vulnerability management. Familiarity with cloud security (AWS, Azure, GCP) Pay...
detection and response, and vulnerability scanning Understands business needs and has a commitment to delivering high-quality... following: VPN, firewall, network monitoring, intrusion detection, web server security and wireless security, and cloud...
, Performance and Scaling a Cloud product is preferrable. Deep understanding of security, threats, vulnerability detection...
, Performance and Scaling a Cloud product is preferrable. Deep understanding of security, threats, vulnerability detection...
Recovery Support the cybersecurity incident response process, including detection, response, and recovery planning... with vulnerability management, threat modeling, and incident response in manufacturing environments. Knowledge of firewalls, network...
to vulnerability assessments to mitigation implementation. Develop and perform product-level intrusion detection activities. Perform.... A Day in the Life • Perform product and device level cybersecurity activities, including incident response, vulnerability...
and implement workflows using LLM-based agents for reasoning and vulnerability detection. Integrate Model Context Protocol (MCP...
, and Varonis DLP. The ideal candidate will be responsible for threat detection, incident response, data protection, and enhancing... SecOps SIEM for log ingestion and monitoring. Implement UEBA use cases for insider threat detection. Build...
security controls and incident response procedures Perform threat hunting and vulnerability assessments to proactively... events using Elastic SIEM, developing and maintaining detection rules and alerts Design and implement security automation...
, develop, and deploy mitigations for recurring vulnerability patterns. Conduct security testing, research, and analysis... development lifecycle, large-scale computing, modelling, cybersecurity, and/or anomaly detection. More than 7 years of hands...
. Develop or implement open-source/third-party tools to assist in detection, prevention and analysis of security threats.... Assist in incident detection and response efforts. Implement zero-trust patterns with cloud agnostic tools to support...
and deployment pipelines. Build tooling for container and API security, including vulnerability scanning and policy enforcement.... AI-Driven Enablement Support adoption of AI/ML-based DevSecOps tools for anomaly detection, policy enforcement, and risk...
. Own incident management, including detection, triaging, mitigation, communication, root cause analysis (RCA), and post... — incident management (detection → triage → mitigation → RCA/post-mortem), system health monitoring, performance analysis...
strategies for vulnerability detection, prioritization, and remediation Communicate clearly with peers, customers, and senior...