tab-stops:list .25in"1. Leads and manages the security incident escalation procedures to counteract potential threats and/or exploited vulnerabilities.
tab-stops:list .25in"2. Functions as a subject matter expert for Security Information Event Management (SIEM) technology. Directly monitors and analyzes events, along with responding to alerts and notifications.
tab-stops:list .25in"3. Analyzes threat intelligence data and indicators of compromise.
tab-stops:list .25in"4. Maintains knowledge of latest attack strategies and implements protection strategies.
tab-stops:list .25in"5. Investigates suspicious network and endpoint activity.
tab-stops:list .25in"6. Supports end-user security issues; including phishing, encryption and infected computer systems.
tab-stops:list .25in"7. Partners with information security engineers to implement and maintain security technologies.
tab-stops:list .25in"8. Participates in vulnerability management, including performing scans and coordinating remediation activities.
tab-stops:list .25in"9. Prepares system security reports by collecting, analyzing and summarizing data trends.
tab-stops:list .25in"10. Coordinates knowledge sharing with other analysts and develops solutions that minimize impact from security incidents. Documents and conforms to processes related to security monitoring.
tab-stops:list .25in"11. Reviews requests for security policy exceptions.
tab-stops:list .25in"12. Performs other operational support duties, as required.
normal"*ADA Essential Functions
|