in building AWS cloud security capabilities in code and deploying infrastructure in code - Implementation experience with enterprise security solutions such as WAF, IPS, Anti-DDOS, and SIEM - Experience in supporting internal and external customers. You understand what it means to draw out critical customer needs and focus your knowledge and More ❯
expertise (design and/or implementation) in Cloud Computing technologies and implementation experience with enterprise security solutions such as SSO, Federation, WAF, IPS, Anti-DDOS, and SIEM. - Experience with Infrastructure-as-Code Tools such as CloudFormation, Terraform, Chef, Puppet, Salt, or Ansible in production environments at scale. - Understanding architectural implications More ❯
A technical background in Cyber-Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
A technical background in Cyber-Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
SOAR, or Managed Security Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or Vulnerability Management ? Even better. They're also super open to people who are coming from an operational security background and More ❯
the following vendors: Fortinet, Palo Alto, Cisco, Juniper, Zscaler, CrowdStrike... Experience in any of the following is advantageous: SIEM, SOAR, MSSP, DDoS, WAF, EDR, IDAM... Excellent communication skills and the ability to simplify complex concepts for a range of stakeholders A proactive, can-do attitude More ❯
tools and technologies such as firewalls, intrusion detection systems, endpoint protection and distributeddenialofservice (DDoS) mitigation solutions. Build strong relationships with customers, providing ongoing cybersecurity consultation and support. Communicate findings and recommendations effectively and develop strategies and roadmaps for improvement. More ❯