SlideShare a Scribd company logo
1 of 1
Professional Roles and Responsibilities:
 Responsible for handling all type of Infrastructure Information Security alerts –
Review the alerts and handle them as per the process & best practices. This involves
working with different groups and ensuring that all the alerts are closed in a timely
manner [SLA]
 Patch & Vulnerability Management Process – Responsible for identifying security
gaps and vulnerabilities through different tools and techniques in organization
devices/systems. Scan results are analysed and fixes are applied as per the
organization vulnerability policy
 System Security Logs: Monitor and analyse the logs using tools for unusual or
suspicious activity. Interpret such activity and make recommendations for resolution
 Compile Security Metrics - Manage various IT & IS Security reports based on
information generated from different security Applications, Services & tools –
Compile security metrics and efficiency security metrics for management review
 Assist and Contribute to IT risk identification, classification and response processes
 Actively contribute to inter-departmental and cross-functional teams for the protection
of information & information assets in organization
 Involve & support in organization IS internal audits [iso 27001,KCO ,etc.] on
assigned departments effectively to ensure systems are functioning, performing
properly and audit report & recommendation has been submitted to management
 Actively conducting training/awareness program for newly joined employee on
Information Security
 Provide support and direction for improving InfoSec policies, processes, and
standards

More Related Content

What's hot

Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills AbilityJoseph Lynn
 
App Showcase: Security Audit
App Showcase: Security AuditApp Showcase: Security Audit
App Showcase: Security AuditResolver Inc.
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Donald E. Hester
 
Raam risk analysis assessment and management
Raam risk analysis assessment and managementRaam risk analysis assessment and management
Raam risk analysis assessment and managementTerry Penney
 
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Sreekanth Narendran
 
Quiz1FinalPeriod
Quiz1FinalPeriodQuiz1FinalPeriod
Quiz1FinalPeriodlearnt
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsMohammad Abdul Matin Emon
 
JillBushorJune15
JillBushorJune15JillBushorJune15
JillBushorJune15Jill Bushor
 
Project Management for Information System Development
Project Management for Information System DevelopmentProject Management for Information System Development
Project Management for Information System DevelopmentNabilaNuzhat
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsMohammad Abdul Matin Emon
 
Network Security Expert and Risk Analyst
Network Security Expert and Risk AnalystNetwork Security Expert and Risk Analyst
Network Security Expert and Risk AnalystAshok K DL
 
Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...Smart ERP Solutions, Inc.
 

What's hot (20)

Practical IT auditing
Practical IT auditingPractical IT auditing
Practical IT auditing
 
Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills Ability
 
App Showcase: Security Audit
App Showcase: Security AuditApp Showcase: Security Audit
App Showcase: Security Audit
 
Need for IT Compliance
Need for IT ComplianceNeed for IT Compliance
Need for IT Compliance
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
 
Hit Project
Hit ProjectHit Project
Hit Project
 
Raam risk analysis assessment and management
Raam risk analysis assessment and managementRaam risk analysis assessment and management
Raam risk analysis assessment and management
 
Resume Joe Johnston
Resume Joe JohnstonResume Joe Johnston
Resume Joe Johnston
 
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
 
Quiz1FinalPeriod
Quiz1FinalPeriodQuiz1FinalPeriod
Quiz1FinalPeriod
 
penetration test
penetration testpenetration test
penetration test
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
 
JillBushorJune15
JillBushorJune15JillBushorJune15
JillBushorJune15
 
Project Management for Information System Development
Project Management for Information System DevelopmentProject Management for Information System Development
Project Management for Information System Development
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
 
Network Security Expert and Risk Analyst
Network Security Expert and Risk AnalystNetwork Security Expert and Risk Analyst
Network Security Expert and Risk Analyst
 
Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
 

Similar to Professional Roles and Responsibilities

Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Information Security Engineer - Shanghai
Information Security Engineer - ShanghaiInformation Security Engineer - Shanghai
Information Security Engineer - ShanghaiMohammed Sameer
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxAzra'ee Mamat
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfBest Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfSysvoot Antivirus
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec SysMicheal Isreal
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptxHardikKundra
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 

Similar to Professional Roles and Responsibilities (20)

Chapter005
Chapter005Chapter005
Chapter005
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Information Security Engineer - Shanghai
Information Security Engineer - ShanghaiInformation Security Engineer - Shanghai
Information Security Engineer - Shanghai
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
 
Chapter003
Chapter003Chapter003
Chapter003
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfBest Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdf
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Balaji Jagan -Resume
Balaji Jagan -ResumeBalaji Jagan -Resume
Balaji Jagan -Resume
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 

Professional Roles and Responsibilities

  • 1. Professional Roles and Responsibilities:  Responsible for handling all type of Infrastructure Information Security alerts – Review the alerts and handle them as per the process & best practices. This involves working with different groups and ensuring that all the alerts are closed in a timely manner [SLA]  Patch & Vulnerability Management Process – Responsible for identifying security gaps and vulnerabilities through different tools and techniques in organization devices/systems. Scan results are analysed and fixes are applied as per the organization vulnerability policy  System Security Logs: Monitor and analyse the logs using tools for unusual or suspicious activity. Interpret such activity and make recommendations for resolution  Compile Security Metrics - Manage various IT & IS Security reports based on information generated from different security Applications, Services & tools – Compile security metrics and efficiency security metrics for management review  Assist and Contribute to IT risk identification, classification and response processes  Actively contribute to inter-departmental and cross-functional teams for the protection of information & information assets in organization  Involve & support in organization IS internal audits [iso 27001,KCO ,etc.] on assigned departments effectively to ensure systems are functioning, performing properly and audit report & recommendation has been submitted to management  Actively conducting training/awareness program for newly joined employee on Information Security  Provide support and direction for improving InfoSec policies, processes, and standards