Identification and Detection of Control Failures
- Designs solutions to address identified control issues (e.g., network, identity, high security), taking intended and unintended consequences into account. Operationalizes and scales a program and solution appropriately. Identifies high priority opportunities and makes data-driven recommendations for efficiencies to improve security posture (e.g., streamline processes, automate). Assists team with technical acumen as needed.
Automation
- Recommends automation to improve effectiveness and efficiencies of security operations. Supports development and implementation of new automation. Provides automation and proactively proposes where investment will yield greatest efficiencies. Develops and implements solutions. Improves solutions over time.
Translate Security Policy and Standards into Effective Controls
- Contributes to security policy and standards. Maintains accurate and comprehensive security policy and standards. Designs mitigation strategies to addresses identified gaps in policy. Educates others (e.g., business partners, peers, industry) on security policy. Recognizes patterns and trends and recommends solutions for improvement. Recommends refinement of security policy and standards.
Collaboration
- Collaborates with internal and external parties to ensure service level agreement (SLAs) are reached when addressing threats. Supports development of requirements for solutions. Defines new requirements and feature sets.
Customer/Partner Experience
- Drives improvements in customer and partner experience by sharing best practices and interacting with customers. Ensures proper resources are engaged to address issue and prevent recurrence. Designs for the customer experience. Develops and implements metrics for customer satisfaction. Ensures alignment to customer and partner experience standards. Gathers future requirements directly from customers. Designs to maximize customer experience. Creates partnership and advocacy with customers. Educates business partners to influence behavior to make different decisions that enhance security posture. Defines customer and partner requirements, anticipates needs, and measures quality of experience.
Data-Driven Analysis
- Recommends mitigation strategies based on trends identified in the analysis of key metrics, key performance indicators (KPIs), and other data sources (e.g., bugs, unhealthy data pipeline). Defines and implements metrics to address gaps in measurement. Influences others to take action in response to findings, prioritized by severity.
Security Incident Response
- Independently analyzes prioritized attempted or successful efforts to compromise systems security. Recommends next steps and escalations to resolve. Develops response plans for new or nuanced issues. Devises mitigation steps. Provides guidance to limit exposure. Apprises leadership of status. Manages stakeholder communication appropriately. Conducts postmortem analysis. Helps others understand triage, analysis, and prioritization.
Monitoring and Detection
- Builds new detection capabilities. Researches new attacks and identifies trends to reduce noise in detections. Drives prioritization and resources required to address potential or actual intrusions identified as a result of monitoring activities. Drives automation of detection and response.
Red/Purple Team Operations
- Understands how weaponized code can be used in operations. Determines how tactical tools can be adopted to larger scale automation. Engages security assurance organizations to identify new Tools Tactics Procedures (TTPs) and leverages in breaches operations.
Threat Intelligence and Analysis
- Recommends potential detections and signatures for defense capabilities based on analysis and understanding of threat trends in the industry.
Other