|Monitoring security access.
Conducting security assessments through vulnerability testing and risk analysis.
Performing both internal and external security audits.
Analysing security breaches to identify the root cause.
Continuously updating the company’s incident response and disaster recovery plans.
Verifying the security of third-party vendors and collaborating with them to meet security requirements.
Resolve outage issues by isolating programs and collaborating with engineers to find fixes.Answer incoming calls for tech support from customers and other staff members within the company.
Write scripts and design automated network functions to increase efficiency.
Replace malfunctioning or underperforming hardware connected to the network.
Write regular analytics and network infrastructure reports.
Monitor network security, isolate potential security vulnerabilities, and remedy security issues that could compromise the network.
Troubleshoot IP networks and network hardware.
This includes troubleshooting individual computers and laptops connected to the network.
Communicate via phone, email, chat with customer support teams and contacts.