threats by implementing and maintaining security controls Monitoring systems for suspicious activity Managing Implement and manage security technologies and controls, including firewalls, intrusion detection/prevention solutions. Design, implement, and maintain security controls and configurations within AWS environments Configure Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service (KMS), and cybersecurity roles, with a focus on blue team operations, incident detection and response, and security
existing systems. Develop and document standard operating procedures and protocols. Optimise InfoSec systems