Good technical knowledge of implementing EDR policies, Rules creation, and Incident/alert management.
Good experience on security Incident response and investigation to identify the root cause of security breaches and gather evidence.
Hands-on experience in log Ingestion, Fine-tuning on reducing false positives, Event correlation, and analysis.
Hands-on experience with Automation (SOAR) and Custom KQL queries.
Develop and update incident response plans and playbooks to ensure effective handling of various types of incidents.
Develop and implement email security policies and best practices to safeguard against threats such as phishing, malware, and data breaches.
Design and enforce DLP policies and rules to prevent unauthorized data access, sharing, and transmission.
Deep technical knowledge of vulnerability management and administration
Collect and analyze threat intelligence to stay informed about emerging threats and vulnerabilities relevant to the organization.
In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, Malware investigation, web Proxy and network concepts etc.
Engage in research and development of security solutions, testing new tools and methods for potential implementation.
Creating metrics for a Security Operations Center (SOC) measuring its effectiveness and identifying areas for improvement.