SalaryUSD TBD TBD
- Research vendor offerings and conduct POCs.
- Coordinate with other teams to implement new technologies and remediate issues.
- Monitor asset inventory, installed agents, and status of devices.
- Review vulnerability dashboards and organizational impact of changing threat landscape.
- Monitor data inventories, policy violations. Produce reports and metrics.
- Monitor and process incident response queues.
- Monitor SIEM logs and investigate incidents.
- Monitor content filter dashboards and investigate anomalies as appropriate.
- Manage endpoint firewall operation and adjust as necessary.
- Teach, train or advise staff on information security related topics
Security Analyst - 3