Work with software developers/engineers to facilitate development of a software development plan that defines project level software implementation processes, requirements, design, constructs, integrations, and associated testing software and firmware.
More Uses of the Cyber Fusion Center Toolkit:
- Perform upgrade and deploy patches post impact analysis in non production and production environment in accordance with change management protocol.
- Lead: threat response, forensics, intelligence, endpoint protection, SIEM engineering and data analytics.
- Maintain contact with all clients in the market area to ensure high levels of client satisfaction.
- Participate actively in decision making with engagement management and seek to understand the broader impact of current decisions.
- Be accountable for marketing content initiatives, across multiple platforms and formats to drive sales, engagement, retention and positive customer behavior.
- Keep abreast of latest IT Security, regulatory and compliance trends to support various risk and data models.
- Coordinate with solution vendor for product upgrades/security patches, and troubleshooting product related defects and issues.
- Be accountable for providing critical input and decision support to shape threat detection (new methods and tuning) and prevention controls.
- Ensure you guide; respond to information security incidents by applying containment and eradication strategies.
- Ensure you direct; aid in and lead daily, weekly, quarterly, and yearly production reporting for clients, partners, and internal teams.
- Prepare and deliver content for weekly/biweekly operational reports and operational status meetings.
- Establish that your operation coordinates with relevant security officials to pass security clearances for Technology Engagement Team members.
- Maintain/ update/ modify all filters, dashboards, and boards used for reporting in workflow management system.
- Support the design and implementation of Cyber Fusion Center/SOC operating models, identifying, evaluating, and providing solutions to evaluate complex business via a threat based approach.
- Govern: quality engineering center of excellence is an optimal environment for your professional involvement and growth.
- Manage knowledge and capability in planning, management, budgeting, and coordinating technical and contract reporting requirements.
- Contribute to the delivery of large and complex strategic advisory service engagements, engaging with management level individuals across a wide range of industry segments.
- Be accountable for developing and maintaining intelligence related policies, procedures, standards, and guidelines.
- Perform periodic health monitoring and maintenance of the security tool, specifically monitoring capacity, monitoring logs for issues etc.
- Oversee planning, design, implementation, testing, and operation of Cybersecurity processes and systems.
- Manage: own the security risk register and the ongoing management of inherent and residual information security risks.
- Collaborate with Cyber architecture and engineering team to ensure the appropriate architecture and engineering solutions to support the fusion model.
- Control: observant and uses of data to make evidence based decisions with a view to continually improving the flow of code from developers to production.
- Perform SIEM configuration management, and troubleshooting, addressing complex issues and day to day operations management.
- Devise: customer success you strive daily to exceed expectations and achieve customer mission success.
- Provide guidance on security architecture for threat detection and response systems used as a part of the overall security operations and fusion centers.
- Be accountable for responding to threats escalated from the SOC, Threat Hunt, DLP, Red Team, Vulnerability Management, Insider Threat, or infrastructure teams.
- Provide direction of business process and security architecture design as it relates security analyzing tools for security incident management.
- Be accountable for managing Cybersecurity operations, in a security operations center (SOC) or Cyber Fusion Center environment.
- Supervise: you are ready to do the work while also being given opportunities to contribute to the broader business where possible.