HamburgerMenu
hirist

Job Description

Junior Security Engineer :

Junior Security Engineer roles often involve working with Vulnerability Management, XDR (Extended Detection and Response), EDR (Endpoint Detection and Response), Zero Trust, and DLP (Data Loss Prevention) technologies. These positions support senior engineers in securing an organization's systems and data. A junior engineer's responsibilities include monitoring networks, identifying vulnerabilities, and implementing security measures under guidance.

Vulnerability Management :

- Assisting in the identification and assessment of vulnerabilities in systems and applications.

- Supporting the remediation process for identified vulnerabilities.

- Using vulnerability scanning tools and reporting on findings.

XDR/EDR :

- Monitoring security alerts from XDR and EDR platforms.

- Assisting in the investigation of security incidents identified by XDR/EDR.

- Contributing to the tuning and optimization of XDR/EDR solutions.

Zero Trust :

- Supporting the implementation of Zero Trust principles, such as least privilege access.

- Assisting in the configuration of network segmentation and access controls.

DLP :


- Monitoring data loss prevention alerts and incidents.

- Assisting in the development and implementation of DLP policies.

- Helping to identify and protect sensitive data.

Roles & Responsibilities :

- Monitoring: Continuously monitoring security systems and alerts for suspicious activity.

- Analysis: Analyzing security data to identify potential threats and vulnerabilities.

- Response: Responding to security incidents and assisting in incident containment and remediation.

- Documentation: Maintaining accurate records of security events, vulnerabilities, and incidents.

- Reporting: Generating reports on security posture, vulnerabilities, and incidents.

- Implementation: Assisting in the implementation of security solutions and controls.

- Collaboration: Working with other teams, such as IT operations and development, to ensure security best practices are followed.

- Learning: Continuously learning about new threats, vulnerabilities, and security technologies.


info-icon

Did you find something suspicious?