Work with software developers/engineers to facilitate development of a software development plan that defines project level software implementation processes, requirements, design, constructs, integrations, and associated testing software and firmware.

More Uses of the Cyber Fusion Center Toolkit:

  • Perform upgrade and deploy patches post impact analysis in non production and production environment in accordance with change management protocol.
  • Lead: threat response, forensics, intelligence, endpoint protection, SIEM engineering and data analytics.
  • Maintain contact with all clients in the market area to ensure high levels of client satisfaction.
  • Participate actively in decision making with engagement management and seek to understand the broader impact of current decisions.
  • Be accountable for marketing content initiatives, across multiple platforms and formats to drive sales, engagement, retention and positive customer behavior.
  • Keep abreast of latest IT Security, regulatory and compliance trends to support various risk and data models.
  • Coordinate with solution vendor for product upgrades/security patches, and troubleshooting product related defects and issues.
  • Be accountable for providing critical input and decision support to shape threat detection (new methods and tuning) and prevention controls.
  • Ensure you guide; respond to information security incidents by applying containment and eradication strategies.
  • Ensure you direct; aid in and lead daily, weekly, quarterly, and yearly production reporting for clients, partners, and internal teams.
  • Prepare and deliver content for weekly/biweekly operational reports and operational status meetings.
  • Establish that your operation coordinates with relevant security officials to pass security clearances for Technology Engagement Team members.
  • Maintain/ update/ modify all filters, dashboards, and boards used for reporting in workflow management system.
  • Support the design and implementation of Cyber Fusion Center/SOC operating models, identifying, evaluating, and providing solutions to evaluate complex business via a threat based approach.
  • Govern: quality engineering center of excellence is an optimal environment for your professional involvement and growth.
  • Manage knowledge and capability in planning, management, budgeting, and coordinating technical and contract reporting requirements.
  • Contribute to the delivery of large and complex strategic advisory service engagements, engaging with management level individuals across a wide range of industry segments.
  • Be accountable for developing and maintaining intelligence related policies, procedures, standards, and guidelines.
  • Perform periodic health monitoring and maintenance of the security tool, specifically monitoring capacity, monitoring logs for issues etc.
  • Oversee planning, design, implementation, testing, and operation of Cybersecurity processes and systems.
  • Manage: own the security risk register and the ongoing management of inherent and residual information security risks.
  • Collaborate with Cyber architecture and engineering team to ensure the appropriate architecture and engineering solutions to support the fusion model.
  • Control: observant and uses of data to make evidence based decisions with a view to continually improving the flow of code from developers to production.
  • Perform SIEM configuration management, and troubleshooting, addressing complex issues and day to day operations management.
  • Devise: customer success you strive daily to exceed expectations and achieve customer mission success.
  • Provide guidance on security architecture for threat detection and response systems used as a part of the overall security operations and fusion centers.
  • Be accountable for responding to threats escalated from the SOC, Threat Hunt, DLP, Red Team, Vulnerability Management, Insider Threat, or infrastructure teams.
  • Provide direction of business process and security architecture design as it relates security analyzing tools for security incident management.
  • Be accountable for managing Cybersecurity operations, in a security operations center (SOC) or Cyber Fusion Center environment.
  • Supervise: you are ready to do the work while also being given opportunities to contribute to the broader business where possible.

 

Categories: Articles