Security operations engineer
MaharashtraQualys
...network and host activities associated with both successful and unsuccessful intrusions by threat actor's basis perimeter security logs. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Should have worked in third party security monitoring tool to [...]
Category Management & Consulting