Security delivery lead
BengaluruAccenture
...attacker behaviors such as:Initial access, Privilege escalation, Lateral movement, CW/C2 communication, Persistence mechanisms, Data exfiltration techniques - Validate SOC visibility and ensure telemetry coverage across endpoints, network, cloud, and identity. - Identify detection gaps and propose enhancements to SIEM and EDR [...]
Job Type: Full-time
Category Fashion & Arts