Analyze
organization's cybersecurity defense policies and configurations to evaluate
compliance with regulations and organizational directives.
Correlate
incident data to identify vulnerabilities
Use
continuous monitoring tools to assess risk on an ongoing basis
Prepare
cybersecurity assessment and audit reports that identify technical and
procedural findings, and include recommended remediation strategies and
solutions.
Carry out vulnerability scanning on systems and
assets