Responsible for planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks
Troubleshoots various Information System and cyber security software and data privacy issues and collaborates with the SOC team on these issues
Conducts security assessments of systems and applications using penetration tests, ethical hacking tools and risk assessment/mediation methodologies to evaluate vulnerabilities
Develops, tests and validates solutions to remediate exploitable conditions on devices such as web servers, mail servers, routers, firewalls and intrusion detection systems
Evaluates, codes and implements software fixes (patches) to address system vulnerabilities such as malicious code (e.g., viruses), system exploitation using SQL injection, cross-site scripting, buffer overflows, parameter tampering, hidden field manipulation, cookie poisoning and web services manipulation
Makes recommendations to correct vulnerabilities and ensures the organizations data and infrastructure are protected by enabling the appropriate security controls