7.1. Cloud Security Overview (IaaS, PaaS, SaaS) 7.2. Cloud Security Risks and Threats 7.3. Cloud Security Controls (IAM, Encryption, etc.) 7.4. Cloud Security Architecture and Compliance
6.1. SIEM Overview and Architecture 6.2. Log Collection and Analysis 6.3. Event Correlation and Alerting 6.4. SIEM Use Cases and Best Practices
9.1. Network Security Fundamentals (TCP/IP, Network Protocols, etc.) 9.2. Network Segmentation and Isolation 9.3. Firewalls and Intrusion Prevention Systems (IPS) 9.4. Network Access Control (NAC) and Secure Networking
5.1. Incident Response Methodologies (NIST, SANS, etc.) 5.2. Threat Hunting and Detection 5.3. Incident Response Process (Preparation, Identification, Containment, etc.) 5.4. Post-Incident Activities (Lessons Learned, etc.)
We wish to caution job seekers that OMRON does not authorize external parties to conduct employment drives or extend offers of employment on its behalf. OMRON does not make unsolicited offers of employment and ask for any financial commitment from a candidate as a pre-employment requirement. Further, Omron does not contact prospective candidates through WhatsApp, Telegram or any other instant messaging apps or social media websites. Please be aware that if you receive or see any request of this regard, it might be coming from parties or persons that are not affiliated to OMRON in any way.
OMRON bears no responsibility for the consequences of the actions either from the fraudsters or the victims.