...regarding the selection and implementation of appropriate security technologies.
Support incident response activities, including forensic analysis and remediation efforts, to minimize impact from security breaches.
Provide security requirements analysis of...
...using tools such as intrusion detection systems (IDS), security information and event management (SIEM) systems, antivirus software, forensic tools, and advanced networking knowledge.
Certifications for incident response such as Certified Incident Handler (GCIH),...