Your daily workout
Analysis: You use industry standard Cybersecurity Frameworks to perform security controls gap analyses and provide recommendations for improvements and remediations
Assessment: You conduct security audits, vulnerability scans, and risk assessments to develop a risk register and mitigation strategy
Documentation: You lead or support the development and maintenance of security policies, procedures, and standards to support the confidentiality, integrity, and availability of our systems and data
Implementation and Maintenance: You design and implement security controls, processes, and systems that protect our systems and data and improve our security posture
Monitor and Investigate: You participate in security incident investigations by monitoring and analyzing security logs and alerts, summarizing the data, establishing a timeline of the attack, providing guidance for containment, eradication, and recovery, and participating in post-incident activities
Development: You stay up-to-date with the current threat landscape, trends in the industry, and vulnerability management techniques