Correlate incident data to identify vulnerabilities.
Analyze log files from multiple sources to identify possible threats to network security.
Triage incidents to identify specific vulnerability determine scope urgency and potential impact make recommendations that enable expeditious remediation.
Analyze and report cyber defense trends.
Perform initial collection of images to relevant forensic standards inspect to evaluate possible mitigation and remediation measures.
Analyze network alerts from multiple sources to determine possible causes.
Track and document cyber incidents from initial detection to final resolution.
Write and publish cyber defense techniques guidance and post incident reports to appropriate constituencies.
Employ defenseindepth principles and practices in line with organizational policies.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.