Implements, maintains, and operates security hardware and software, including antivirus, endpoint protection, and XDR solutions.
Implements, maintains, and operates Identity Access Management (IAM) components,
including single sign-on and multi-factor authentication.
Assists in developing Information Security policies and procedures.
Evaluates and recommends Information security tools and solutions.
Implements and monitors security controls and procedures.
Develops monitoring and visibility capabilities, reports on incidents, vulnerabilities, and trends.
Performs periodic security scans of organization's infrastructure to identify vulnerabilities.
Works with third-party security firms to perform annual assessment and remediation of vulnerabilities to the organization's Information Technology infrastructure.
Understands and implements the organization's Incident Response Plan.
Monitors network traffic flow to/from and within the organization using network analysis tools and firewall logs.
Writes comprehensive reports including incident response debriefs, software evaluation plans, and product evaluation reports.
Works and communicates effectively with the various professionals throughout the organization.
Conducts educational exercises for other team members and departments on a periodic basis.
Responds to Information Security incidents and alerts.
Develops and modifies basic scripts to assist in log ingestion, automation of routine tasks, and deployment of Information Security tools.
Serves as a point of escalation to Helpdesk and IT Operations on Information Security issues.
Follows the organization's change management process and ensures stakeholders are involved in changes.
Provides timely notification to Information Security Management of internal and business partner incidents.