In this role, you will perform basic vulnerability scans using vendor utility tools. Monitors security audit and intrusion detection system logs for system and network anomalies. Investigates and/or escalates security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security. Documents and reports event(s).
In this role, you will be responsible for delivering high-quality business and functional requirements (in the form of user stories) to the development teams for the purpose of completing the design, coding, testing, and implementation phases of the project life cycle.