Analyze events and security alerts from monitoring results and other security incident reports together with Tier 1 Monitoring.
Examine and Analyze from the history of broader cyber security events and from other external cyber security events.
Determine the steps for detention and direct the steps for the remediation process from the above data.
Provide input on recommendations in carrying out prevention and eradication measures.
Minimum Diploma/Bachelor degree in Information Technology
Min 2-3 years experience in related field
Strong analytical and planning skills
Excellent verbal and written communication skills
Demonstrated ability to solve complex problems and develop innovative solutions
Understand the fundamental concepts of OSI Layer, TCP/IP, VLAN, Switching, Routing
Experienced to work in multiple O/S (e.g. MS Windows, Linux, Unix)
Good knowledge in information or network security standard implementation, e.g. ISO 27001, PCI-DDS, NIST Standard, Pen-test Framework
Good knowledge in security areas (e.g. Firewall, IPS/IDS, VPN, Anti-spam, Anti-malware
At least has one of the following certificates: CompTIA (CySA+, Security+, CASP), GIAC (GSIF, GCED, GCDA,), CREST (CRSA), ECcouncil (CEH, ECSA, CIHE) Certified Incident Handling Engineer (CIHE)
MEL-P provides its services through five components: 1) monitoring support services, 2) designing and conducting performance and impact evaluations, 3)â¦
You will directly report to the VP of Brand & Marketing and work closely with the PR & Brand Manager.
Establish deep expertise in uncovering customer needs,â¦
PT. Kharisma Potensia Indonesia (KPI) sedang membutuhkan para karyawan yang memiliki motivasi yang tinggi untuk ditempatkan pada client kami Perusahaanâ¦