Standard and Hardened Build Compliance
Vulnerability Management and Penetration Testing
Regular reporting and evidence of key security controls
Security event L1 triage and response (IPS, Advanced malware, Anti-virus, Email)
Security Architecture Review
Coordination with various infrastructure/support teams to ensure alignment of effective implementation of Infrastructure Security controls and processes.
Ensure that vulnerability assessments are performed to evaluate effectiveness of security controls in applications, middleware, databases, network and operating systems.