Updating user policies please wait comodo
Provide technical expertise in one or more of the IT areas of security infrastructure architecture and implementation.
Oversee the design and development of cyber exercises, training materials, and training requirements.
Develops, implements, coordinates, reviews and evaluate security plans, policies, technical/administrative procedures, accreditation documents, programs associated with IT equipment software, design, data and physical security, communications.
Specialize with implementing and administering security solutions in support of enterprise information security objectives including Security Information and Event Management SIEM , Forensic Tool Kit FTK , Memory Forensics, intrusion detection, e-discovery, and access management capabilities.
Also perform tasks in support of enterprise incident response capabilities including preparation, detection, containment, remediation, and resolution phases.
Applies information security, and assurance policy, principles, and practices.SUMMARY PROFILE Goal oriented IT Specialist with approximately 15 years of experience implementing IT products and procedures to ensure compliance with company policies.Focused and driven, with an earnest determination to troubleshoot complex problems thoroughly and efficiently Flexible team player with excellent interpersonal and communication skills Committed work ethic with key focus on the mastering and incorporation of current and economically feasible innovations in technology and in computer science field.Information Security Analyst Confidential Serve as Team Leader over several IT Projects, conduct weekly conference calls, and delegate responsibilities to team.Oversee the planning, designing, and implementing of new systems or changes in existing data processing systems to support management control and decision-making activities.