Develop and maintain a robust threat intelligence gathering and monitoring plan.
Responding to alerts from the various monitoring/detection systems and platforms within defined SLAs.
Identifying and developing new ideas to enhance detection modules for mitigation across the security platforms.
Designing and Operating enterprise security controls, Malware analysis and remediation as well as Web Server - Anomaly Analysis, DDOS/Dos Attacks, Data Leak/Data exfiltration, Privilege escalation, Security Incident Response management, Security Operations management and maintaining IT general controls.
Contribute to tuning of configurations/use cases on security devices based on false positives/true positives noted during incident reviews.
Manage external audits by coordinating with the regulators and external auditors.
Ensure compliance with organizational information security policies and procedures.
Graduate in Computer Engineering, Science or information technology or any related field from recognized university.