Security operations engineer
MaharashtraQualys
...unsuccessful intrusions by threat actor's basis perimeter security logs. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Should have worked in third party security monitoring tool to research, document and respond on the security incidents. Monitor SIEM [...]
Category Management & Consulting