In this role, you will be responsible to partner with key business functions, internal IT staff and external auditors to ensure that the SOX compliance program and key controls for IT processes and procedures are in place and monitored across the organization.
In this role, you will perform basic vulnerability scans using vendor utility tools. Monitors security audit and intrusion detection system logs for system and network anomalies. Investigates and/or escalates security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security. Documents and reports event(s).