Sign-in & see how your skills match this job
Sign-in & Get noticed by top recruiters and get hired fast
Team Management, Risk Management, Vulnerability Management, Strategic Planning, Process Improvement, Compliance, Reporting, Security Awareness, Training, Effective Communication, Computer Networking, IT Security, Network troubleshooting, SIEM, Security automation, Leadership skills, Analytical skills,Cyber Security Operations, Incident response, Security Tool Optimization, Endpoint troubleshooting, Security frameworks, Investigating security issuesincidents, Network Firewalls, Problemsolving skills, Documentation skills
Network analysis, GREM,EDR systems, Cyber Security Incident Response, Windows systems, Unix systems, Host forensics, Memory forensics, TCPIP Protocols, Investigation techniques, CREST CRT, GCFA, GCFE, GNFA
Cyber Security, Information Security, Vulnerability Management, Network Security, Risk Management, Problem Solving, Analytical Skills, Customer Service,Security Incident Event Management SIEM, Compliance NIST, GDPR, PCI, Network Segmentation, Security Attacks, Microsoft Platforms, Thirdparty Relationship Management
Information Security, Computer Science, Cloud Security, Security Operations, AWS, Azure, GCP, IAM, Network Security, Analytical Skills, Communication Skills,Wiz, Incident Response, DevSecOps, Identity Tools, Cybersecurity, Threat Detection, WQL Queries, Microsoft Sentinel, Defender for Cloud, MITRE ATTCK Framework
Team Management, Risk Management, Vulnerability Management, Strategic Planning, Process Improvement, Compliance, Reporting, Security Awareness, Training, Effective Communication, Computer Networking, IT Security, Network troubleshooting, SIEM, Security automation, Leadership skills, Analytical skills,Cyber Security Operations, Incident response, Security Tool Optimization, Endpoint troubleshooting, Security frameworks, Investigating security issuesincidents, Network Firewalls, Problemsolving skills, Documentation skills
Network analysis, GREM,EDR systems, Cyber Security Incident Response, Windows systems, Unix systems, Host forensics, Memory forensics, TCPIP Protocols, Investigation techniques, CREST CRT, GCFA, GCFE, GNFA
Cyber Security, Information Security, Vulnerability Management, Network Security, Risk Management, Problem Solving, Analytical Skills, Customer Service,Security Incident Event Management SIEM, Compliance NIST, GDPR, PCI, Network Segmentation, Security Attacks, Microsoft Platforms, Thirdparty Relationship Management
Information Security, Computer Science, Cloud Security, Security Operations, AWS, Azure, GCP, IAM, Network Security, Analytical Skills, Communication Skills,Wiz, Incident Response, DevSecOps, Identity Tools, Cybersecurity, Threat Detection, WQL Queries, Microsoft Sentinel, Defender for Cloud, MITRE ATTCK Framework
* Il benchmark retributivo si basa sugli obiettivi retributivi dei leader del mercato nei rispettivi settori. È pensato per orientare gli utenti Premium nella valutazione delle posizioni aperte e aiutarli a negoziare la propria retribuzione. Tale benchmark non è fornito direttamente dall'azienda, quindi la retribuzione effettiva potrà risultare anche notevolmente superiore o inferiore.