- Setting up monitoring systems to ensure network security
- Implementing Security Information Management (SIM) and Security Event Management (SEM) solutions
- Installing and setting up network security equipment such as Firewall, IPS, UTM
- Setting up powerful software platforms for collecting logs, searching, monitoring, analyzing and analyzing information such as Splunk and ...
- Performing various types of network penetration tests and Penetration Security
- Setting up various tools for collecting, aggregating, indexing, storing and analyzing security data such as Wazuh and ...
- Implementing and operating the Security Operations Center (SOC)
- Installing, configuring and supporting all Splunk products
- Setting up and supporting log collection tools (from the operating system, log analysis, strange searches) on the system security platform such as ELK Stack and ...
- Setting up monitoring systems to ensure network security
- Implementing Security Information Management (SIM) and Security Event Management (SEM) solutions
- Installing and setting up network security equipment such as Firewall, IPS, UTM
- Setting up powerful software platforms for collecting logs, searching, monitoring, analyzing and analyzing information such as Splunk and ...
- Performing various types of network penetration tests and Penetration Security
- Setting up various tools for collecting, aggregating, indexing, storing and analyzing security data such as Wazuh and ...
- Implementing and operating the Security Operations Center (SOC)
- Installing, configuring and supporting all Splunk products
- Setting up and supporting log collection tools (from the operating system, log analysis, strange searches) on the system security platform such as ELK Stack and ...