scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
scale; including endpoint, cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoSProtection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat More ❯
ownership and work independently as needed to resolve customer issues. Duties and Responsibilities: Maintain Industry Training - This involves keeping up-to-date on security technologies, threats, and risk mitigation techniques Maintain Knowledge of Current Threats - Keep up-to-date on current threats by regularly reading industry-related articles Case Management - ensuring the case management process is handled efficiently … analysis for information technology is required Excellent writing and communications skills Familiarization with a variety of information and network security monitoring tools (ArcSight SIEM, QRadar SIEM, Splunk, Arbor DDoSMitigation, Cisco IDS/IPS, Netcool, and Imperva WAF, among others) Ability to work in a dynamic team-centered environment Education Preferred: Bachelors Degree in Computer Information More ❯