Cyber Incident Manager
) Log Correlation and Threat Hunting Firewall, Proxy, and IDS Log Analysis (e.g., Fortinet, Meraki) Threat Intelligence...
) Log Correlation and Threat Hunting Firewall, Proxy, and IDS Log Analysis (e.g., Fortinet, Meraki) Threat Intelligence...
or more of the following vender network technologies: Cisco, Juniper, F5, Aruba, Palo Alto, Dell, Brocade, and Fortinet...
or more of the following vender network technologies: Cisco, Juniper, F5, Aruba, Palo Alto, Dell, Brocade, and Fortinet...
or more of the following vender network technologies: Cisco, Juniper, F5, Aruba, Palo Alto, Dell, Brocade, and Fortinet...
networking, VPN configurations, and firewall deployments is required and experience specifically with Fortinet is preferred...
or more of the following vender network technologies: Cisco, Juniper, F5, Aruba, Palo Alto, Dell, Brocade, and Fortinet...
or more of the following vender network technologies: Cisco, Juniper, F5, Aruba, Palo Alto, Dell, Brocade, and Fortinet...
or more of the following vender network technologies: Cisco, Juniper, F5, Aruba, Palo Alto, Dell, Brocade, and Fortinet...
or more of the following vender network technologies: Cisco, Juniper, F5, Aruba, Palo Alto, Dell, Brocade, and Fortinet...
, Juniper, Palo Alto, Fortinet, F5 Cloud – Azure, AWS, OCI Interconnections, Firewalls & Web Application Firewalls...