Hi all, I will be applying under the PNP Inland EE stream (with NOC 2171) and would appreciate you going over my job description and providing insights. Thanks as always!!
- Identifying and assessing cyber security risks to end user applications and systems.
- Monitoring cyber attacks, intrusions, anomalous activities and developing a road map for cyber
threat detection, mitigation, and deterring cyber attacks.
- Simulating and executing malware-infected programs in a test sandbox environment and analyzing
their behavior for implementing security measures in order to protect end user systems.
- Working with Intrusion Detection Systems (IDS), developing IDS rules and performing sanity
testing on the IDS rules developed.
- Testing Intrusion Detection Systems to ensure the IDS rules developed are in place and these
rules get triggered when a malware begins execution.
- Analyzing network behavior and checking for anomalous network activity triggered by the
malwares.
- Publishing the Intrusion Detection System rules to clients and performing testing based on the
output received.
- Documenting computer security risks and malware behavior to identify computer malwares from
each other.
- Identifying and assessing cyber security risks to end user applications and systems.
- Monitoring cyber attacks, intrusions, anomalous activities and developing a road map for cyber
threat detection, mitigation, and deterring cyber attacks.
- Simulating and executing malware-infected programs in a test sandbox environment and analyzing
their behavior for implementing security measures in order to protect end user systems.
- Working with Intrusion Detection Systems (IDS), developing IDS rules and performing sanity
testing on the IDS rules developed.
- Testing Intrusion Detection Systems to ensure the IDS rules developed are in place and these
rules get triggered when a malware begins execution.
- Analyzing network behavior and checking for anomalous network activity triggered by the
malwares.
- Publishing the Intrusion Detection System rules to clients and performing testing based on the
output received.
- Documenting computer security risks and malware behavior to identify computer malwares from
each other.