Operations. This includes monitoring and responding to incidents and alerts within the D3 platform and also Microsoft hunting and tuning, effectively closing down incidents with comprehensive documentation. Furthermore team as well as Managed Services and / or client incident response personnel, in order to identify, contain for threat hunting and other security-related investigations. Experience in IT administration, preferably environment. Experience in incident response and handling, including detailed incident reporting and documentation
cloud computing, ITIL, COBIT Facilitation Investigative / Fact Finding Structured analysis Command of Business Desk SA and Business Desk MAH Resolve incidents, problems, service requests and change requests time to resolve) included in agreed SLAs Ensure Incident / Request updates are at an acceptable quality
Proactively monitors, investigates and reports on information security incidents, Internet use and ICT Centre tasks Proactively conducts analyses and investigation of alleged breaches of Internet use by staff
Proactively monitors, investigates and reports on information security incidents, Internet use and ICT Centre tasks Proactively conducts analyses and investigation of alleged breaches of Internet use by staff
containment of security incidents, including post incident recovery and forensic investigation for root cause
guidelines in a timely manner. Ensure recurring incidents are managed appropriately to resolution. Ensure performance, throughput, availability, and exceptional incidents. Ensure that all standards are observed and procedures
Maintaining configuration data and currency. Managing incidents and issues with appropriate and timely escalation in Customer questionnaires. Handling day-to-day incident volumes to a high level of service. Providing service to all our clients. Ensuring that all Incidents/Requests are dealt with within contracted SLA skills. Ability to take ownership of and progress incidents to resolution. Ability to work under pressure
evolving cybersecurity threats and potential incidents protectively and swiftly in order to safeguard cyber security incident response plans, lead and coordinate the response to security incidents, and oversee