Incident Manager

SAN0500

About Candidate

The candidate is an experienced Level 3 Security Analyst with expertise in managing and securing multi-client infrastructures, primarily in the public sector. They have worked extensively with SIEM tools such as LogICA, MonICA, Azure Sentinel, IBM QRadar, and Juniper STRM to protect clients’ networks from cyber threats. Their primary responsibilities included advanced cyber threat analysis, early warning management, incident resolution, and coordination with national and international security networks. They also provided detailed reports and managed security technologies to safeguard over 80 clients. The candidate has handled perimeter security for projects like the Ministry of Finance, where they monitored firewalls, AntiSPAM systems, and web filtering tools. Additionally, they worked at INDRA, focusing on internal systems security, implementing technologies like Netscaler ADC firewalls, Trend Micro IMSA AntiSPAM, and TippingPoint IPS. They have hands-on experience with a variety of tools including Remedy, Nmap, Wireshark, Infoblox, Nessus, and VirusTotal. Their skillset spans various cybersecurity technologies such as SIEM, firewalls, IPS/IDS, WAFs, and APT prevention, making them a versatile professional in cybersecurity. The candidate has worked in industries such as government and technology, ensuring the protection of critical infrastructures.

  • Level 3 Security Analyst with expertise in protecting multi-client infrastructures, primarily in the public sector.
  • Proficient in using SIEM tools (LogICA, MonICA, Azure Sentinel, IBM QRadar, Juniper STRM) to monitor and analyze cyber threats.
  • Managed over 80 clients, ensuring robust defense against cyber risks through proactive threat analysis and early warning management.
  • Experienced in incident resolution, technical support, and coordination with national and international security forums.
  • Hands-on with perimeter security tools such as Stonesoft, Checkpoint, and Netscaler ADC firewalls.
  • Managed AntiSPAM systems (TrendMicro IMSA, Cisco IronPort) and web filtering tools (Blue Coat Proxy SG, Pulse Secure).
  • Worked on AntiAPT solutions like Trend Micro Deep Discovery and sandboxing technologies (DDD, DDI, DDA).
  • Proficient in managing intrusion prevention systems (IPS) such as Sourcefire Cisco, TippingPoint, and FortiWeb WAF.
  • Implemented security event analysis using SIEM platforms like Azure Sentinel, LogICA, and AlienVault OSSIM.
  • Utilized security monitoring tools such as Wireshark, Nmap, and Infoblox to analyze and secure network traffic.
  • Supported critical security infrastructure for the Ministry of Finance and INDRA, focusing on incident detection and system protection.
  • Strong knowledge of specialized cybersecurity tools like Remedy, CMDBuild, Nessus, VirusTotal, and Honeypots.
  • Experienced in providing detailed reports and documentation on security incidents and analysis for clients.
  • Skilled in managing and monitoring security systems and ensuring information protection in internal systems.

Skills

SIEM (LogICA, MonICA, Azure Sentinel, IBM QRadar, Juniper STRM, AlienVault OSSIM), AntiSPAM (TrendMicro IMSA, Cisco IronPort), Web Filtering (Blue Coat Proxy SG, Pulse Secure), Firewalls (Stonesoft, Checkpoint R80.X, Netscaler ADC), IPS/IDS (Sourcefire Cisco, TippingPoint, FortiWeb WAF), AntiAPT (Trend Micro Deep Discovery), Sandboxing (DDD, DDI, DDA), Honeypots, Antivirus (Trend Micro Office Scan), Security Platforms (CCN Lucia, Reyes), Network Security (McAfee ePO), Incident Resolution, Technical Support, Security Event Analysis, Remedy, CMDBuild, Nmap, Wireshark, VirusTotal, Infoblox.

Be the first to review “Incident Manager”

Your Rating for this listing