· Researched emerging cyber threats in order to recommend appropriate countermeasures.
· Analyzed network traffic data, system logs, intrusion detection alerts and other sources to identify potential security issues.
· Implemented security measures such as firewalls, encryption technologies and authentication systems to protect critical information assets.
· Developed and implemented security policies, standards, guidelines and procedures to ensure the secure operation of systems and networks.
· Assisted with developing disaster recovery plans for different business units in order to minimize disruption during an emergency situation.
· Monitored all incoming and outgoing network traffic using intrusion detection tools to detect malicious activity or policy violations.
Maintained up-to-date knowledge of current cyber threats by reading industry publications and attending seminars and conferences.