with implementing software CI/CD pipeline - Jenkins, Codefresh or similar Configuration management, Ansible, Puppet, Chef or similar Experience with monitoring and/or logaggregation systems - ELK, Graylog, Prometheus, Zabbix, PRTG and other Great understanding of networking and Nix based operating systems Ability to work across multiple more »
and willing to drive it. You are comfortable working with CI/CD tools (ideally IBM UrbanCode Deploy, TeamCity or Jenkins), monitoring tools and logaggregation tools. Ideally, you would have worked with VMs and/or Docker and orchestration systems like Kubernetes/OpenShift. more »
maintain runbooks, escalation procedures, and consume available threat intelligence.Utilize detective controls to develop rules and alerts to drive security monitoring.Perform hunt activities across our logaggregation and SIEM platforms.Recommend, test, tune and implement SIEM and other tooling correlation rules.Identify false-positives from alerting, and perform incident response, triage … experience with one of the major SIEM platforms in use i.e Splunk, Q1Radar, etcExcellent understanding of common exploit scenarios and indicators of compromise (IOCs)Log analysis and experience reviewing security events.Ability to manipulate data and produce relevant metrics and reporting around security incidents.Excellent understanding and experience across broad spectrum more »