Oversee and direct the participation of team members in complex hardware and software upgrades across all security platforms; provide security analysis for all hardware/software platforms and provide security resources for operating system and security software upgrades.

More Uses of the Endpoint Security Toolkit:

  • Develop auditing and reporting for primary security tools as authentication directories and distributed authentication systems.
  • Identify: work closely with managers of it infrastructure, enterprise applications and technology services units on the identification and implementation of appropriate security procedures, software, and hardware.
  • Come up with new and innovative ways of increasing security, manageability, and transparency while preserving privacy and ease of use.
  • Analyze and manage security technologies to provide detective and preventative capabilities (vulnerability scanning, Endpoint Security, intrusion detection, network forensics, network, and application security and security, and event/incident management).
  • Serve as an endpoint monitoring, threat hunting and security information event management analyst/engineer for client Endpoint Security monitoring engagements.
  • Coordinate: work closely with development staff to perform vulnerability scans on web applications, report results, and recommend solutions.
  • Secure that your organization designs, develop, engineers, and implements solutions that meet security requirements (relating to SIEM solutions and event collection).
  • Provide appropriate escalation of information which enables visibility and decision making process to various Tech departments along with Information Security and Risk leadership team.
  • Execute information security activities as vulnerability management, application development security, business continuity, networking and/or risk management.
  • Arrange that your organization recommends, administer, and monitors network security through operating system controls, routing, and filtering devices, and security software.
  • Formulate: review performance of anti malware technologies and reports on patterns in attacks to update signatures and install any additional security control needs.
  • Develop, improve, and execute on business plans which improve security posture and align to help meet the needs of business partners.
  • Drive: channel partners have many security vendors in portfolio and identifying the best security solutions for your mutual customers can be accomplished through consistent high quality enablement.
  • Manage knowledgeable of network and security architecture principles, firewall and IDS/IPS fundamentals, Endpoint Security systems and other security protective/detective systems.
  • Develop: be foundational to intermediate trouble shooting skills across complex enterprise applications, server and endpoint environments.
  • Ensure Endpoint Security solutions, policies and emerging technology are on track to meet and respond to threats to your data and endpoint infrastructure.
  • Detect, investigate, document and report actual or potential network security violations, intrusions or other inappropriate use.
  • Pilot: work to effectively deploy defined security architecture, provide solution support, and solution demos at large enterprise customers to enable adoption.
  • Warrant that your organization identifies, develop, and implements mechanisms to detect security incidents in order to enhance compliance with and in support of security standards and procedures.
  • Organize: research and recommend one security tool that could be used in your environment, account for the benefits, and conduct a proof of concept.
  • Manage configuration of your Endpoint Security software as endpoint detection and response, and host based intrusion detection software.
  • Identify: work hand in hand with the regulatory compliance team to implement solutions that meet the needs of the business and reduce risk to an acceptable level.
  • Perform research, analysis and design of network and Endpoint Security controls appropriate for the classification of data stored or processed in the enterprise.
  • Support change management tasking relative to the security policies associated with the Endpoint Security solutions that you support.
  • Initiate: work closely with the marketing and product teams to design and implement successful lead generation and go to market campaigns, and drive overall sales excellence in a competitive market.


Categories: Articles