Implement defensive security measures for computer or information systems
● Monitor external data sources (e.g., cyber defense vendor sites, computer emergency response teams, security focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise.
● Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
● Perform cyber defense incident triage, including determining scope, urgency, and potential impact; identifying the specific vulnerability, and making recommendations that enable expeditious remediation.
● Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
● Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable incident response teams.
● Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
● Track and document cyber defense incidents from initial detection through final resolution.
● Perform cyber defense trend analysis and reporting.
● Build a new incident handling procedure, conduct training presentations.
● Assess the quality of security controls using performance indicators.