SlideShare a Scribd company logo
1 of 1
Professional Roles and Responsibilities:
 Responsible for handling all type of Infrastructure Information Security alerts –
Review the alerts and handle them as per the process & best practices. This involves
working with different groups and ensuring that all the alerts are closed in a timely
manner [SLA]
 Patch & Vulnerability Management Process – Responsible for identifying security
gaps and vulnerabilities through different tools and techniques in organization
devices/systems. Scan results are analysed [prioritise: C: H: M] and fixes are applied
as per the vendor recommendations.
 System Security Logs: Monitor and analyse the logs using tools for unusual or
suspicious activity. Interpret such activity and make recommendations for resolution
 Compile Security Metrics - Manage various IT & IS Security reports based on
information generated from different security Applications, Services & tools –
Compile security metrics and efficiency security metrics for management review
 Assist and Contribute to IT risk identification, classification and response processes
 Actively contribute to inter-departmental and cross-functional teams for the protection
of information & information assets in organization
 Involve & support in organization IS internal audits [iso 27001,KCO ,etc.] on
assigned departments effectively to ensure systems are functioning, performing
properly and audit report & recommendation has been submitted to management
 Actively conducting training/awareness program for newly joined employee on
Information Security
 Provide support and direction for improving InfoSec policies, processes, and
standards

More Related Content

What's hot

Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Nicole Valerio
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsMohammad Abdul Matin Emon
 
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsMohammad Abdul Matin Emon
 
App Showcase: Security Audit
App Showcase: Security AuditApp Showcase: Security Audit
App Showcase: Security AuditResolver Inc.
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Donald E. Hester
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Yasir Khan
 
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Sreekanth Narendran
 
Raam risk analysis assessment and management
Raam risk analysis assessment and managementRaam risk analysis assessment and management
Raam risk analysis assessment and managementTerry Penney
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT SystemsICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT SystemsMohammad Abdul Matin Emon
 

What's hot (20)

penetration test
penetration testpenetration test
penetration test
 
Chapter005
Chapter005Chapter005
Chapter005
 
Chapter008
Chapter008Chapter008
Chapter008
 
Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)Developing ics cyber security improvement plan(5)
Developing ics cyber security improvement plan(5)
 
Security audit
Security auditSecurity audit
Security audit
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
 
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
 
App Showcase: Security Audit
App Showcase: Security AuditApp Showcase: Security Audit
App Showcase: Security Audit
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
 
Presentation saddam
Presentation saddamPresentation saddam
Presentation saddam
 
Raam risk analysis assessment and management
Raam risk analysis assessment and managementRaam risk analysis assessment and management
Raam risk analysis assessment and management
 
Security Audit View
Security Audit ViewSecurity Audit View
Security Audit View
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT SystemsICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
 

Viewers also liked

Mechanical behavior and statistical study of aluminum wires belonging to low ...
Mechanical behavior and statistical study of aluminum wires belonging to low ...Mechanical behavior and statistical study of aluminum wires belonging to low ...
Mechanical behavior and statistical study of aluminum wires belonging to low ...theijes
 
Master presentation May 2005
Master presentation May 2005Master presentation May 2005
Master presentation May 2005Jo Alvis
 
Pcu230 pi pump_controlwithpf400drives_rev_a
Pcu230 pi pump_controlwithpf400drives_rev_aPcu230 pi pump_controlwithpf400drives_rev_a
Pcu230 pi pump_controlwithpf400drives_rev_aconfidencial
 
Pcu230 pi fan_controlwithpf400drives_rev_a
Pcu230 pi fan_controlwithpf400drives_rev_aPcu230 pi fan_controlwithpf400drives_rev_a
Pcu230 pi fan_controlwithpf400drives_rev_aconfidencial
 
Power point 97 2003 show
Power point 97 2003 showPower point 97 2003 show
Power point 97 2003 showsanecum
 
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...theijes
 
Gestão de Projetos e Programas - Aula # 14
Gestão de Projetos e Programas - Aula # 14Gestão de Projetos e Programas - Aula # 14
Gestão de Projetos e Programas - Aula # 14Ethel Capuano
 
Presentacion educacion virtual y educacion presencial
Presentacion educacion virtual y educacion presencialPresentacion educacion virtual y educacion presencial
Presentacion educacion virtual y educacion presencialALBA NURY MONTOYA OSPINA
 
Toys on tour- Tentacool (second week in Greece)
Toys on tour- Tentacool (second week in Greece)Toys on tour- Tentacool (second week in Greece)
Toys on tour- Tentacool (second week in Greece)Eirini Karagiorgaki
 
Teorias da Conduta no Direito Penal
Teorias da Conduta no Direito PenalTeorias da Conduta no Direito Penal
Teorias da Conduta no Direito PenalSenna Bismarck
 
Advances in cutting tool technology
Advances in cutting tool technologyAdvances in cutting tool technology
Advances in cutting tool technologyNandu Sonmankar
 

Viewers also liked (20)

Braunshirn
BraunshirnBraunshirn
Braunshirn
 
Vocabulary
VocabularyVocabulary
Vocabulary
 
Mechanical behavior and statistical study of aluminum wires belonging to low ...
Mechanical behavior and statistical study of aluminum wires belonging to low ...Mechanical behavior and statistical study of aluminum wires belonging to low ...
Mechanical behavior and statistical study of aluminum wires belonging to low ...
 
Master presentation May 2005
Master presentation May 2005Master presentation May 2005
Master presentation May 2005
 
Pcu230 pi pump_controlwithpf400drives_rev_a
Pcu230 pi pump_controlwithpf400drives_rev_aPcu230 pi pump_controlwithpf400drives_rev_a
Pcu230 pi pump_controlwithpf400drives_rev_a
 
ADA 5
ADA 5 ADA 5
ADA 5
 
Mahmoud Qotb CV
Mahmoud Qotb CVMahmoud Qotb CV
Mahmoud Qotb CV
 
Texto a
Texto aTexto a
Texto a
 
tema 11
tema 11tema 11
tema 11
 
Pcu230 pi fan_controlwithpf400drives_rev_a
Pcu230 pi fan_controlwithpf400drives_rev_aPcu230 pi fan_controlwithpf400drives_rev_a
Pcu230 pi fan_controlwithpf400drives_rev_a
 
Power point 97 2003 show
Power point 97 2003 showPower point 97 2003 show
Power point 97 2003 show
 
RUPESH MALVIYA ICICI
RUPESH MALVIYA  ICICIRUPESH MALVIYA  ICICI
RUPESH MALVIYA ICICI
 
Ada 1-sem equipo3
Ada 1-sem equipo3Ada 1-sem equipo3
Ada 1-sem equipo3
 
tema 12
tema 12tema 12
tema 12
 
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
 
Gestão de Projetos e Programas - Aula # 14
Gestão de Projetos e Programas - Aula # 14Gestão de Projetos e Programas - Aula # 14
Gestão de Projetos e Programas - Aula # 14
 
Presentacion educacion virtual y educacion presencial
Presentacion educacion virtual y educacion presencialPresentacion educacion virtual y educacion presencial
Presentacion educacion virtual y educacion presencial
 
Toys on tour- Tentacool (second week in Greece)
Toys on tour- Tentacool (second week in Greece)Toys on tour- Tentacool (second week in Greece)
Toys on tour- Tentacool (second week in Greece)
 
Teorias da Conduta no Direito Penal
Teorias da Conduta no Direito PenalTeorias da Conduta no Direito Penal
Teorias da Conduta no Direito Penal
 
Advances in cutting tool technology
Advances in cutting tool technologyAdvances in cutting tool technology
Advances in cutting tool technology
 

Similar to Professional Roles and Responsibilities

Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxAzra'ee Mamat
 
Information Security Engineer - Shanghai
Information Security Engineer - ShanghaiInformation Security Engineer - Shanghai
Information Security Engineer - ShanghaiMohammed Sameer
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptxHardikKundra
 
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfBest Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfSysvoot Antivirus
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec SysMicheal Isreal
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfpriyanshamadhwal2
 

Similar to Professional Roles and Responsibilities (20)

Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
 
Information Security Engineer - Shanghai
Information Security Engineer - ShanghaiInformation Security Engineer - Shanghai
Information Security Engineer - Shanghai
 
Balaji Jagan -Resume
Balaji Jagan -ResumeBalaji Jagan -Resume
Balaji Jagan -Resume
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfBest Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdf
 
Chapter003
Chapter003Chapter003
Chapter003
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
chris_shinh
chris_shinhchris_shinh
chris_shinh
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys
 
internet securityand cyber law Unit3 1
internet securityand  cyber law Unit3 1internet securityand  cyber law Unit3 1
internet securityand cyber law Unit3 1
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
 

Professional Roles and Responsibilities

  • 1. Professional Roles and Responsibilities:  Responsible for handling all type of Infrastructure Information Security alerts – Review the alerts and handle them as per the process & best practices. This involves working with different groups and ensuring that all the alerts are closed in a timely manner [SLA]  Patch & Vulnerability Management Process – Responsible for identifying security gaps and vulnerabilities through different tools and techniques in organization devices/systems. Scan results are analysed [prioritise: C: H: M] and fixes are applied as per the vendor recommendations.  System Security Logs: Monitor and analyse the logs using tools for unusual or suspicious activity. Interpret such activity and make recommendations for resolution  Compile Security Metrics - Manage various IT & IS Security reports based on information generated from different security Applications, Services & tools – Compile security metrics and efficiency security metrics for management review  Assist and Contribute to IT risk identification, classification and response processes  Actively contribute to inter-departmental and cross-functional teams for the protection of information & information assets in organization  Involve & support in organization IS internal audits [iso 27001,KCO ,etc.] on assigned departments effectively to ensure systems are functioning, performing properly and audit report & recommendation has been submitted to management  Actively conducting training/awareness program for newly joined employee on Information Security  Provide support and direction for improving InfoSec policies, processes, and standards