![]() Documents security changes according to established Information Systems (IS) procedures. Participates in Change Management to ensure that all Information Security changes to systems are subject to the appropriate level of management control.Performs continuous operation and maintenance tasks, which includes endpoint compliance monitoring and directing the remediation of any detected viruses and malware to ensure endpoint security is properly maintained and risks are minimized. ![]() Manages workstation and server endpoint security through the use of Symantec’s Endpoint Protection technology.Co-manages internal Data Loss Protection (DLP) Program to discover data storage, monitor its use, define policies, review and remediate incidents, and perform system administration.Conducts continuing research on emerging information security technologies in support of infrastructure development efforts, and recommend technologies that will increase cost effectiveness and infrastructure flexibility. ![]() Administers and maintains security systems to ensure data is not disclosed to unwanted parties.Change Management & Incident management.Recognized for applying a blend of architectural, technical and communication capabilities to achieve objectives ranging from enhancing Information Security goals and initiatives to fostering interdepartmental collaboration. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |