The successful candidate will support the protection, monitoring, and defense of the organization’s technology infrastructure and data assets. They will operate and optimize security tools such as Trellix EDR, Splunk SIEM, Sonatype Nexus, and Tenable Nessus to detect, analyse, and respond to cyber t