Studying and tweaking processes
Cybersecurity Analyst
- Participated in risk assessment exercises designed to identify areas of vulnerability within the organization's IT infrastructure.
- Investigated suspected intrusions or breaches into the company's computer networks and systems.
- Created detailed incident reports following a successful breach or other security event.
- Developed and implemented security policies and procedures to protect the company's assets from unauthorized access.
- Updated existing processes and procedures related to cybersecurity best practices regularly.
- Implemented firewalls and other security measures to protect data from external threats.
- Reviewed audit logs daily for unusual activity or patterns that could indicate an attempted breach or attack.
- Conducted vulnerability scans using automated tools to detect any weaknesses in the system.