Arrange that your organization conducts complex research, evaluation, collection, dissemination, and fusion of multi source information from one or more intelligence disciplines to satisfy a broad range of Cyberspace customer requirements.
- Provide guidance and support for all assigned Security Authorization activities.
- Perform static and dynamic code analysis (manual and tool based) for security defects.
- Make meaningful change through critical and dynamic thought to stay ahead of emerging threats.
- Provide crucial intelligence and network support that safeguards the Cyber domain.
- Perform root cause analysis of security incidents for further enhancement of alert catalog.
- Support user training and enablement, helping to integrate your data and technology into daily workflows, systems and processes.
- Be certain that your strategy coordinates the installation of client department specific applications and systems.
- Provide expert analytic investigative support of large scale and complex security incidents.
- Interact with all roles in Cybersecurity, as Threat Intelligence, SOC, Vulnerability Management, Incident Response, Threat Hunting, Security Architecture, and leadership.
- Manage work with key stakeholders to implement remediation plans in response to incidents.
- Collaborate and communicate effectively with development teams to ensure secure code is released.
- Be accountable for engaging in the complex technical utilization of information obtained from multi intelligence sources, through.
- Support the design and deployment of incident response security solutions to facilitate a comprehensive defense in depth strategy and intrusion defense chain methodology.
- Confirm your group develops and prepares penetration testing Rules of Engagement, test plans, and reports.
- Be accountable for tuning regularly performing tuning and filtering SIEM alerts and monitoring components to ensure only relevant security data is gathered.
- Manage eradication and recovery steps as part of the overall incident response plan.
- Be driven to stay on the cutting edge of data privacy, data lineage, and data governance.
- Manage work with management, operations and network/server, applications team to coordinate local incident response and corrective action activities.
- Create correlations and other logic to identify attackers and defend the network against advanced attacks.
- Secure that your project utilizes standard corporate tools to record change and problem activities for tracking purposes.
- Ensure your planning practices and multi source intelligence information systems to capture and report on data in order to develop.
- Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
- Be accountable for shifting the ways clients invest in, integrate, and innovate technology solutions.
- Support NIST risk management framework (RMF) based assessment and authorization (a and a) activities.