0% found this document useful (0 votes)
9 views

Knowledge

The document outlines the roles and responsibilities of a cyber security professional, including developing and implementing security strategies, monitoring systems for threats, educating staff on best practices, and authoring security reports.

Uploaded by

Vishal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Knowledge

The document outlines the roles and responsibilities of a cyber security professional, including developing and implementing security strategies, monitoring systems for threats, educating staff on best practices, and authoring security reports.

Uploaded by

Vishal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Role & Responsibilities

 Develop, execute, and track the performance of security measures to protect information
and network infrastructure and computer systems

 Identify, define, and document system security requirements and recommend solutions to
management

 Configure, troubleshoot, and maintain security infrastructure software and hardware

 Install software that monitors systems and networks for security breaches and intrusions

 Monitor systems for irregular behavior and set up preventive measures. Engineer, implement
and monitor security measures for the protection of computer systems, networks, and
information

 Plan, develop, implement, and update company’s information security strategy

 Educate and train staff on information system security best practices

 Manage Cyber Security Questionnaire handed out by clients

 Manage and maintain all IT security related documentation

 Prepare and document standard operating procedures and protocols based on guidelines
from IT security frameworks like HIPAA, GDPR, HITRUST, ISO 27001, etc.

 Must have knowledge and experience of basic exploits and tools like tcpdump, Wireshark,
Metasploit, Burp Suite, API, and Mobile App testing etc.

 Understanding of Reverse Engineering, Proxies, VPNs.

 Strong knowledge of Windows, Linux, and Mac Operating systems.

 Strong understanding of conducting various attacks such as XSS, CSRF, Injection attacks,
Escalation of Privilege, Directory Traversal attack, DDoS, Slow packet injection, etc. and the
knowledge of mitigating them.

 Develop technical solutions and new security tools to help mitigate security vulnerabilities
and automate repeatable tasks

 Ensure that the company knows as much as possible, as quickly as possible about security
incidents

 Author comprehensive reports including assessment-based findings, outcomes, and


propositions for further system security enhancement

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy