Cybersecurity Threat & Vulnerability management framework and necessary operational activities that include identify, risk assess, and monitor of vulnerability and associated remediation.
Vulnerability and compliance assessment plans for the ICT and network infrastructure and manage continuous vulnerability discovery to report weaknesses, prioritize hardening efforts, and track remediation efforts.
Conducting on going security assessment and testing for applications and facilitate any adversary simulation activity to respective assets.
Cybersecurity monitoring and incident management including developing/updating respective procedures and playbooks.
Cybersecurity monitoring, detection and response from SOC, as well as continuous assessment and threat management
Communicate cybersecurity risks and posture to respective stakeholders.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.