We look forward to receiving your application regardless of gender, nationality, ethnic and social origin, religion, philosophy of life, disability, age, sexual orientation or identity. * Perform proactive threat hunting by analyzing network traffic, log data, and endpoint activities to detect indicators of compromise (IoCs) and hidden threats. * Strong understanding of network protocols, malware analysis, data recovery, analytical skills, structured work approach and problem-solving competence.
mehr