Provide support in the areas of Application Programming, Business Analysis, Computer Security Systems, Cybersecurity architecture and Engineering, Data Analysis, Project Management, System Administration, System Engineering and Training.

More Uses of the Computer Security Toolkit:

  • Ensure you revitalize; respond to network and system intrusive activity and analyze network traffic and system logs to determine corrective action and implement countermeasures.
  • Provide guidance on building and/or maturing insider threat programs, detecting and responding to Computer Security incidents, and implementation of tools and technologies used for enterprise security.
  • Secure that your design complies; conducts operational tasks, design, development and implementation of Computer Security and protection technologies for organizations information and process systems/applications.
  • Secure that your business performs Computer Security incident response activities for a large organization, coordinates with other government departments to record and report incidents.
  • Identify: conduct Cyber investigations for escalated and challenging Computer Security incidents using computer forensics, network forensics, root cause analysis and malware analysis.
  • Provide guidance on building and/or maturing information security programs, remediation, detecting and responding to Computer Security incidents, and implementation of tools and technologies used for enterprise security.
  • Secure that your operation performs Computer Security incident response activities for a large organization coordinates with other government departments to record and report incidents.
  • Lead: infrastructure it (systems administration, network administration Windows/Linux OS, network administration, active directory and/or virtualization).
  • Ensure you nurture; respond to security incidents in a timely and urgent manner and communicate with the appropriate personnel to properly resolve security incidents.
  • Ensure you participate; build and integrate components ( as web based user interfaces, access control mechanisms, and commercial indexing products) to develop complex user applications or system tools.
  • Standardize: forensic analysts exploit captured media and/or investigator Computer Security incidents in order to derive useful intelligence and/or enable mitigation of network vulnerabilities.
  • Manage: direct and lead the identification of security risks, development, and implementation of security management practices, and the measurement and monitoring of security protection measures.
  • Be accountable for testing and evaluation specialists apply principles, methods, and tools for testing and evaluating computer or computer related equipment/computing systems.
  • Ensure you devise; build, run, and review reports on information security system performance and event anomalies; make minor internal adjustments and help identify substantial gaps based on findings.
  • Assure your project determines the impact of potential adverse or derogatory information; exercises personal judgement and discretion to evaluate the nature of information received and recommends or takes appropriate action.
  • Maintain policies and programs, as approved by Management and in line with clients strategic direction, to support and enhance Platform Operations.
  • Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Ensure you introduce; lead replication, redundancy and disaster recovery systems for an active/active data center that is currently being built using software defined Firewalls, networking and data center.
  • Manage work with innovation and technology and departmental managers and staff to improve systems security for a range of operational technology platforms and technologies.
  • Lead the development and implementation of disaster recovery and business continuity plans, to ensure that appropriate information technology security measures are addressed.
  • Ensure you deliver; recommend Cybersecurity policy that is tailored to address business operational needs and unique system and data considering context, regulatory compliance and appropriate levels of risk.
  • Confirm you direct; respond to Computer Security incidents by collecting, analyzing, preserving digital evidence and ensure that incidents are recorded and tracked in accordance with SOC requirements.
  • Serve as a focal point for office wide corporate and management information tracking metrics, resource allocation, process improvement efforts and multitude of regulatory compliance issue.
  • Be accountable for analyzing digital evidence and investigating Computer Security incidents to derive useful information in support of application/system/network vulnerability mitigation.
  • Collect forensic computer evidence relating to the security incident and any other suspect activity uncovered while investigating the security incident, in responding to Computer Security incidents when tasked.
  • Develop tactical and strategic Cyber intelligence from acquired threat intelligence and technical indicators from external and internal sources.
  • Recognize potential, successful, and unsuccessful intrusion attempts and compromises through review and analysis of relevant event detail and summary information.
  • Ensure your enterprise identifies and implements Cybersecurity and acquisition reform initiatives to strengthen information security compliance, reduce total ownership cost and/or schedule and meet customer requirements.

 

Categories: Articles