Reviews system changes for security implications and recommends improvements.
Understands cyber security methodologies.
Uses proficient knowledge in Java, Net, C++, Python, bash, power shell.
Relies on engineer technology capabilities and trends; types, and techniques to monitor for and prevent hacking attacks in the wild.
Engineers the OSI (Open Systems Interconnection) model and renowned ports and services. Uses advantage Engineer Significant low-level networking experience with the TCP/IP (Transmission Control Protocol/Internet Protocol) stack.
Provides analysis and trending of security log data from a large number of heterogeneous security devices.
Provides threat and vulnerability analysis as well as security advisory services.
Identifies possible malware risks and help resolve any current system infections.
Writes reports based on findings for previous security breaches and threats.
Investigates, documents, and reports on information security issues and emerging trends.
Responsible for aiding in own self-development by being available and receptive to any training made available by the company.
Plans daily activities within the guidelines of company policy, job description and supervisor’s instruction in such a way as to maximize personal output.