Description:
Strong understanding of attacker tactics, techniques, and procedures. 8 Required Experience analyzing logs and telemetry from SIEM, EDR/XDR, network security, identity platforms, and cloud environments. 8 Required Proficiency in query languages and scripting used for threat hunting. 8 Required Solid knowledge of Windows, Linux, and cloud operating systems, including common attack vectors and persistence mechanisms. 8 Required Proven expertise in security considerations of cloud computing: They i
Feb 9, 2026;
from:
dice.com