• Providing security guidance or solutions during the development stages of software systems,
networks, and data centers
• Implementing vulnerability management systems on assets within the premises and on the
cloud.
• Searching for vulnerabilities and risks in network, hardware, and software.
• Handling and coordinating any unusual activities, attacks, and intrusions
• Recognizing the potential threat or attempted breach by closing off the security vulnerability
• Developing new layers of protection and updating the security systems e.g. implementing
and handling firewalls into network infrastructures
• Keeping oneself abreast with the new trends and procedures in cybersecurity and technology
• Providing standby support for cyber security incident response (CIRT)
• Defining, implementing, and sustaining cyber security policies and procedures
• Conducting regular audits to ensure compliance with established security measures