Real-time Event/Log monitoring, Vulnerability, and exploits, Security Incidents identification & investigation, Participate in Vulnerability assessment / penetration test, Reporting. The work schedule consists of 24*7 shifts Required qualifications: Bachelor's degree in computer science Minimum 1 ye