- Monitor networks and systems for security breaches, through the use of monitoring system that detects intrusions and anomalous system behavior
- Investigate Suspicious Activities, Contain and Prevent Them
- Perform periodic network, systems and web/mobile application scans to find vulnerabilities
- Perform penetration testing, simulating an attack on the system to find exploitable weaknesses
- Incident response, including steps to minimize the impact and then conducting a technical and forensic investigation into how the breach happened and the extent of the damage
- Generate reports for both technical and non-technical staff and stakeholders
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues