client's organisation through continuous improvement, incident response excellence, and collaboration with cross-functional and procedures. Security Incident Response : Assist in the investigation, analysis, and resolution of of complex security incidents and breaches. Provide expert guidance and technical support to identify identify the root cause of incidents, mitigate risks, and prevent future occurrences. Security Awareness and matter expert and provide third-line support for incidents, problems, and changes across various cybersecurity
the primary point of contact for all security incidents, working with various teams to resolve them in in a timely and efficient manner. Investigate potential security breaches, conducting root cause analysis developing remediation plans to prevent future incidents. Implement and maintain security controls in accordance management, auditing and monitoring, security incident and event management, data protection (DLP, encryption)
relevant departments when required, to get requests/ incidents resolved on time. Meeting objective and taking Management. Incident Management: Full Application Administration. Data Management. Incident Templates. Service Level Management: Service level management Incident Management. Service level management Change Management
reference number for every incident logged. Responsible for the Hand-over all incidents to the next shift for Processes and Procedures Log all service requests and incidents received within 15 minutes Provide a professional
all analytics, reporting and data needs. Will investigate large data related postpaid invoicing, collections
requirements. Key areas of responsibility Request/Incident logging, handling and escalation (identifying
improvement and risk • Plan and perform special investigations based on customer requirements • Technical Data presented to client Special Investigations: • Special investigations planned and performed based on
conduct successful recoveries. Respond to data loss incidents, implement recovery processes, and maintain security
management environment Advanced threat response and investigation skills Technical Lead in the delivery on Vulnerability
system logically supports user self-learning. Investigates implementation risk sufficiently throughout