Investigate intrusion attempts and perform in-depth analysis of exploits
Monitor and analyze network traffic and alerts
Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, they help enterprises deliver on the promise of digital transformation. At AHEAD, they prioritize creating a culture of belonging, where all perspectives and voices are represented, valued, respected, and heard.
Monitor client environments performing Incident Detection, Validation, and Reporting.
Responsible for the implementation and maintenance of cloud-based SIEM Solutions.
Partner with client Security to continuously improve and enhance Managed Security support.
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, they help enterprises deliver on the promise of digital transformation. They prioritize creating a culture of belonging, where all perspectives and voices are represented, valued, respected, and heard.
Configure, maintain, and manage DLP policies and FIM infrastructure.
Perform real‑time monitoring, investigation, analysis, reporting, and escalation of security events.
Analyze business needs and recommend secure architecture designs, network topologies, and data transmission approaches.
Altisource provides challenging work and career development opportunities. They value great colleagues and are looking for someone with a thorough understanding of the latest security principles.
Lead firewall, network access control, and SASE engagements.
Design and deploy next-generation firewall solutions.
Implement and optimize Cisco ISE for network access control.
They are focused on network security, particularly in firewall and SASE implementations. They value inclusivity, innovation, and teamwork, helping clients navigate the complexities of modern cybersecurity challenges.