, as well as contributing to the implementation and
maintenance of robust security measures to protect our IT infrastructure... to identify malicious activity. Analyze identified malicious activity to determine weaknesses exploited,
exploitation methods... -
Voir cette offre d'emploi