Search Results: 1 vacancy
...Planning for disaster recovery in the event of any security breaches
# Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
# Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or...