The successful candidate will play a key role in safeguarding information systems and networks by proactively monitoring for security threats, responding to incidents, and implementing security best practices. Monitor security alerts from SIEM, firewalls, and endpoint solutions. Analyze incidents and conduct forensic investigations to identify breaches or unauthorized access.