Implement security systems by directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation.

More Uses of the GIAC Toolkit:

  • Formulate: intrusion detection, advanced computer exploitation methodologies and security threat remediation.
  • Drive: technical knowledge in system and network security, authentication and security protocols, and application security.
  • Organize: forensic services also, on occasion, provides technical support legal, ethics and compliance and human resources in conducting internal investigations.
  • Develop software installation scripts and provide code review for complex software installations.
  • Guide: incident response and handling to identify and respond to network attacks, viruses, and intrusions.
  • Be accountable for authoring and implementation of original detection rules for various monitoring systems on the basis of current threats and vulnerabilities.
  • Be accountable for assessing and provide guidance on building and/or maturing information security programs and the implementation of tools and technologies used for enterprise security.
  • Perform periodic testing for compliance with documented security policies, procedures, and standards.
  • Orchestrate: technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography, and application security.
  • Maintain, update, monitor all workstations, application software and/or virtualized technologies in support of assigned tasks.
  • Create documentation regarding the identification, analysis and remediation of security threats and incidents.
  • Oversee and help coordinate communication of corporate wide security activities to stakeholders.
  • Supervise: review available surveillance data to further develop and improve the threat scenarios and use cases.
  • Manage work with security and IT operations at clients to implement remediation plans in response to incidents.
  • Translate technical compliance and risk management terminology to non technical staff.
  • Assure your enterprise identifies areas where existing policies and procedures require change and suggests appropriate changes.
  • Perform follow up analysis throughout the incident lifecycle, and complete projects and tasks associated with security monitoring, detection, and incident response.
  • Establish: development of custom tools to detect malicious activity at the user, host, and network levels, either as stand alone tools or as prototypes of more complex solutions.
  • Systematize: act as primary support contact for security incidents, and provide direction to infrastructure and applications teams to initiate incident response.
  • Be accountable for developing partnerships with Cybersecurity experts and organizations in order to help create secure information systems.
  • Systematize: you are an expert in developing network and system security solutions using current technologies to prevent and resolve network and computer system attacks.
  • Capture Cybersecurity metrics in direct support to executive level briefings (daily, weekly, monthly).
  • Perform root cause analysis so you can continuously improve your prevention, reaction, and remediation of incidents.
  • Ensure you introduce; lead the ability conduct frequency analysis of host system artifacts and analyze patterns of behavior to identify potentially compromised hosts.
  • Analyze and design security solutions for applications and infrastructure, and provide expertise and consulting to internal teams.
  • Ensure you organize; lead systems auditor (CISA), certified information lead systems security professional (CISSP), GIAC security.
  • Manage work with team members to enhance and enrich security monitoring tools with contextual information.
  • Evaluate: voice is taking action to detect, prevent and respond to the continuous flow of types of attacks.
  • Manage: research, recommend, deploy and integrate the security tools and processes needed to protect the information assets and infrastructure.
  • Contribute to the central strategic direction and program objectives and communicating expectations.

 

Categories: Articles