Proactively monitor the environment to detect and implement steps to mitigate cyber-attacks before they occur.
Provide technical expertise regarding security-related concepts to operational teams within the Information Technology Department and the business.
Review, investigate, and respond to real-time alerts within the environment.
Review real-time and historical reports for security and/or compliance violations.
Monitor online security-related resources for new and emerging cyber threats.
Assess new security technologies to determine potential value for the enterprise.
Conduct vulnerability assessments of firm systems and networks.
Manage systems owned by the Information Security Team.
Perform daily system monitoring and reviewing of log data on the SIEM, build searches, check for alarms, drill down through log sources, identify event logs, events, and alerts.
Check suspicious attachments or emails reported by employees.
Check and resolve basic antivirus alerts.
Develop and maintain installation and configuration procedures.