Senior cyber defense analyst, insider threat, itc
KarnatakaNike
...and integrate information from client’s network monitoring tools and other data analytics tools and sources to decipher underlying trends or uncover anomalies and discern obscure patterns and attributes Data Triage - Conduct data triage of anomalous events collected by approved User Activity Monitoring (UAM), Data Loss [...]
Category Banking, Insurance, Finance & Accountancy