|
The Role
• Investigate All cyber suspicious activities, • Validate and ensure quality of all security tickets closed efficiently. • Be able to patriciate in developing SOC strategy • Reviews alerts, threat intelligence, and security data. • Identifies threats that have entered the network, and ... |