Analyzes incidents and vulnerabilities for false positives in the infrastructure (software, hardware, networks) from cybersecurity tools, define countermeasures to remedy the detected incidents and vulnerabilities. They may assist in the planning and implementation of security solutions.
Performs cybersecurity monitoring, including forensic and log analysis to detect security incidents, and helps to mount an incident response. May investigate new technologies and processes to increase cyber resiliency.
Architects and manages permissions for the organization’s security systems.
Designs the security infrastructure and roadmap for the organization in terms of cybersecurity tools.
Performs penetration testing to identify vulnerabilities and recommend safeguards as preemptive measures. Uses white hack skills to exploit vulnerabilities.
Analyzes and assesses damage to the digital assets as a result of security incidents, examines available recovery tools and processes, and recommends solutions.
Monitors the digital assets to identify events and traffic indicators that signal intrusion. Documents the damage caused by detected intrusions and recommends safeguards against similar intrusions.
Analyzes computer viruses and uses advanced threat prevention software to prevent them from delivering their payload.
A member of the team that provides tabletop exercise and rapid response to security attacks such as viruses and denial-of-service attacks.
Contact us with your questions