Conducting security assessments and audits to identify and mitigate potential risks
•Performing routine security audits to ensure policy compliance
•Addressing security gaps in existing systems and infrastructure
•Researching and recommending new security technologies and solutions
•Training sta on security best practices to promote awareness
•Collaborating with vendors to ensure security standards are met
•Developing and implementing security protocols and procedures
•Proactively identifying vulnerabilities and led remediation e orts, bolstering system
integrity
•Actively monitored security logs and alerts, responding to incidents promptly