Profile
Install, implement, secure and manage different network or computing technologies tuning into same rhyme to support the users business requirements and objectives.
Administering the company’s perimeter Security appliances (IPS, WAF, SSL VPN)
Conducting vulnerability assessments and penetration tests on the company’s networks and external facing applications
Conducting cyber incident response activities (detection, analysis, investigation, forensics)
Ensuring IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security
Reviewing logs using analytic tools such as Openrefine, R, Splunk or Arc...