Protect computer systems by creating barriers deterring external access to them
Recognize problems within systems by identifying uncharacteristic activity
Assess current situations with the network security and carry out audits
Implement improvements where needed and keep the users informed by completing performance reports on a regular basis to communicate the status of the system security.
Customizing access to information per rules and necessity
Maintaining standard information security policy, procedure, and service
Ensure regulatory compliance
Endpoints/System monitoring for:
Usage of unlicensed and pirated software
Incidents of policy violations as per the information security policy.
Area in IT Security
Security solution testing and implementation
Information Security Policies
Penetration testing & Vulnerability Assessment
Security Incident handling