Resultados de la búsqueda: 6 vacantes
...and eager Cybersecurity analysts, who provide enterprise-wide event identification, triage, and remediation. The team will also escalate... ...with relevancy, accuracy and in a timely manner.
Define protocols and maturing of 'playbooks' for operational response to cyber...
...trace
~ Network Tools; Fluke, Infoblox, Solarwinds, Netscout
~ Network drawings & design documentation (Visio)
~ Routing protocols (EIGRP, OSPF, BGP)
~ Switching and switching technologies (Cisco Catalyst, Nexus, Stack technology, 802.1q, LACP / Ether...
...in programming/scripting languages (e.g., Python, PowerShell) for automation and scripting tasks.
Familiarity with networking protocols, operating systems, and cloud computing platforms.
Certifications such as CISSP, CISM, CEH, CompTIA Security+, or vendor-...
...& Measurement, Quality Management,
~ Exhibits adaptability by being flexible and resilient to project adjustments, unexpected events, and changing requirements. Comfortable with ambiguity and able to adapt project management approaches for different situations....
...and overall relationship building.
Exhibits adaptability by being flexible and resilient to project adjustments, unexpected events, and changing requirements. Comfortable with ambiguity and able to adapt project management approaches for different situations....
...Cyber Security Analyst is responsible for the real-time identification and alerting of information security events that pose an immediate risk to Sysco’s employees, customers, suppliers, shareholders, partners, or business operations.
Requirements
Cybersecurity...