Monitored alerts generated by intrusion detection systems to identify potential attacks against corporate networks.
Analyzed web traffic logs to detect anomalies or malicious activities.
Performed periodic audits of user accounts to ensure compliance with established policies and procedures.
Researched new technologies that could improve existing security protocols and processes.
Trained staff on best practices for information security awareness.
Investigated reported information security incidents by analyzing log files, conducting interviews with involved personnel.
Participated in regular meetings with internal stakeholders to discuss current security trends, identified risk areas and proposed solutions.
Monitored security access logs and analyzed system events for suspicious activity.
Maintained a comprehensive inventory of all IT assets across the organization's network infrastructure.
Responded quickly to emerging threats through patching of vulnerable systems or updating firewall rulesets.
Identified potential security risks, vulnerabilities and threats to the organization's systems and networks.
Provided technical support on security related issues and assisted users in resolving them.
Conducted vulnerability scans of corporate networks to identify weaknesses in the system.
Developed and implemented procedures for responding to cyber-security incidents.
Implemented network security measures such as firewalls, intrusion detection systems, antivirus software.
Created detailed reports highlighting findings from investigations into possible breach attempts or other malicious activities.
Evaluated third-party applications for compatibility with organizational security requirements.
Updated existing documentation such as disaster recovery plans, incident response plans.
Protected secure data files and regulated access.
Made recommendations to improve security procedures and systems.
Analyzed system risk to identify and implement appropriate security countermeasures.
Designed and implemented plans to secure computer files against breach, destruction, or accidental modification.
Built firewalls and encrypted data to secure confidential information.
Determined possible breach of company proprietary data to unauthorized resources and analyzed past performance data to enhance operations.
Evaluated evidence of violations in company security policies to identify violators and investigate incidents, instructing employees on correct procedures.
Performed basic configuration of new customer networks to implement fundamentals of network security with regard to malware detection, firewalls and operating system.
Erected barriers to protect sensitive data by restricting access to unauthorized individuals and maintaining access logs.
Executed risk assessment and data processing system performance tests to verify and configure security settings for data processing and network access.
Alleviated leakage of company proprietary data to unauthorized resources and analyzed past performance data to enhance operations.
Identified possible "leakage" of company proprietary data to unauthorized resources and analyzed past performance data to enhance operations.
Consulted with company employees to determine data access needs demanded by job description and instruct on current proper methods of access and data handling.
Advised clients on advancement of anti-virus and anti-malware technologies to recommend continual upgrades or changes in software and system configurations.
Coordinated installation and configuration of security system plan across company network of many individual client-side points of access.
Spoke at staff meetings to promote security awareness, drawing attention to examples of incidents and consequences and showing how to minimize risk of compromise.
Conducted record searches and coordinated with other units on procedural problems involving complex cases.
Promoted security awareness among employees and clients to alleviate risks and breaches.
Coordinated security updates to avoid outages and downtime.
Learned about latest security threats from blogs and online publications.
Mentored junior employees in departmental activities and procedures.
Updated computer security policies and procedures upon learning of new risks.
Worked closely with fellow security personnel to remedy and alleviate technology issues.
Investigated information security breaches to identify vulnerabilities and evaluate damage.
Reviewed security bulletins and vulnerability patch releases.
Analyzed security procedure violations and developed plans to prevent recurrence.
Educated individuals on complex computer terms using easy-to-understand wording.
Collaborated with stakeholders to implement and update disaster recovery plans.