In this role, you will perform basic vulnerability scans using vendor utility tools. Monitors security audit and intrusion detection system logs for system and network anomalies. Investigates and/or escalates security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security. Documents and reports event(s).
In this role, the selected candidate will collaborate with software development and support teams during the design phase to build secure systems; drive best practices and sound design principles through the Secure Software Development Lifecycle.