Monthly Archives: February 2021

Production Environments

Confirm your organization reviews project specifications with supervisor/lead or other appropriate personnel to ensure that programs are moved to appropriate Production Environments, established standards are met, and that data integrity is maintained.

More Uses of the Production Environments Toolkit:

  • Resolve legal information security issues involving Production Environments, databases, networks, and international service delivery of technology and telecommunications infrastructure.
  • Develop: design, implement and maintain code in development, test, and Production Environments and design solutions to support systematic promotion between environments.
  • Manage work with the other IT organizations to design, develop, and implement IAM solutions and enhancements in support of development, test, and Production Environments.
  • Oversee cloud infrastructure design and develop detailed architecture models for the client to host test, development, and Production Environments.
  • Assure your organization adheres and contributes to improvements to the release process that support quality releases and minimize risk to the production and non Production Environments.
  • Develop, document, implement, and maintain processes and procedures for database administration for production and non Production Environments on a on going basis.
  • Manage and support sandbox and Production Environments across the enterprise to facilitate successful development, testing and deployment of new features and functionality.
  • Confirm your organization ensures identity management systems are highly available as part of the disaster recovery program along with the appropriate development, staging, quality assurance, and Production Environments.
  • Be accountable for monitoring all provided tools in order to proactively and reactively assure that the Production Environments are operating at an optimal level.
  • Ensure Production Environments and data centers are equipped with proper level of resources and are designed correctly to scale per business needs.
  • Manage work with project teams to employ best practices in source control, continuous integration and delivery, automated test execution and release management to all development and Production Environments.
  • Ensure your organization migrates application changes through development, test and Production Environments to thoroughly test changes before applying to live Production Environments.
  • Execute product testing, qualification and commercialization while working closely with cross functional team members in laboratory and Production Environments.
  • Methodize: act as liaison between business owners, development team, and administrative team to make sure changes are migrated in non production and Production Environments for smooth transitions and deployments.
  • Follow the change management procedure and other standard practices in installing, configuring and supporting databases and related items in test and Production Environments.
  • Make sure that your organization participates in the validation of the EHR applications changes, updates and new version upgrades through program and system testing in development and Production Environments.
  • Investigate, analyze, resolve and document hardware and software problems on a wide range of systems in several production and post Production Environments.
  • Arrange that your organization stakeholders work with and understands the value in creating repeatable processes to design development, test, staging and Production Environments that are reliable with high availability.
  • Be accountable for providing database support for development and deployment of database scripts in Development, Test, Pre Production and Production Environments.
  • Manage work with the support/release management team to deploy software into test and Production Environments, ensuring that developed code and configurations are in accordance with the defined standards.
  • Manage work with system administration and development teams to maintain, manage and document all systems in the development, non production, and Production Environments.
  • Coordinate with production support, and configuration management in assessing impact to any changes promoted to parallel Production Environments.
  • Provide insight and guidance to IT software and hardware upgrades and other projects to ensure Production Environments meet and exceed minimum security standards and integrate with internal processes for service and support.
  • Manage development and deployment teams for scoping, prioritization, and scheduling of changes to pre production and Production Environments.

 

GCIH

Analyze threat information gathered from logs, Intrusion Detection Systems (IDS), intelligence reports, vendor sites, and a variety of other sources and recommends rules and other process changes to protect against the same.

More Uses of the GCIH Toolkit:

  • Ensure that you are implementing best practice security policies that address the clients business needs while protecting vital corporate assets.
  • Support customer IT administrators and cybersecurity personnel to ensure successful incident response practices and business system recovery.
  • Manage work with incident response/detect to identify and recommend new internal and external data sources to develop additional threat detection logic.
  • Formulate: information security analysts perform investigations on security alerts and monitor all security tools utilized to secure the environment.
  • Standardize: reactive incident management act with a sense of urgency to minimise business impact with clear stakeholder communication throughout.
  • Configure and operationalize cybersecurity tool data feeds, creating reports to show vulnerability and configuration compliance scan and remediation results.
  • Steer: conduct detailed review of cyber investigations reports and case management system to assess data/content quality, supporting evidence and the appropriateness of case outcomes.
  • Collect functional and technical requirements from stakeholders to perform business analysis for current and future use cases.
  • Oversee: review and take a proactive approach to false positive and work with the various security teams to tune and provide feedback to improve accuracy of the alerts.
  • Advise and consult on options, improvements, cost savings opportunities and cross project impact to other business processes and systems priorities.
  • Guide: IT infrastructure, IT applications, IT Security, and other functional areas to provide a risk based and solution focused perspective on security matters.
  • Provide regular feedback, guidance and consultation to cyber investigative staff, offering direction and expertise to further an investigation.
  • Guide: architecture efficient and effective workflow and reporting solutions for capturing, validating, and approving risk activities.
  • Supervise, motivate and develop a team of high performing cyber investigators through mentorship, expectations and training secondary.
  • Troubleshoot complex issues and provides incident resolution for all related incidents requiring escalated support or subject matter enterprise.
  • Manage the balancing of service, people, change and cost in the delivery of your strategic plan and day to day operations for area of responsibility (where appropriate).
  • Orchestrate: group of individuals whose collective mission is to investigate information security risks to or wrongdoing against your firm.
  • Perform threat hunting activities in client network through proactive analysis of log, network and system data to identify undetected threats.
  • Contribute to the development of effective, efficient and repeatable processes to improve the operations of the SOC and value to clients.
  • Ensure you consider; lead or lead the creation and or maintenance of policies, security metrics, standards, baselines, and guidelines.
  • Confirm your organization directs and controls activities for a client, having overall responsibility for financial management, methods, and staffing to ensure that technical requirements are met.
  • Be accountable for working knowledge in network access control, intrusion prevention and detection systems, firewalls, routers, incident response, information security methods, and risk management.
  • Ensure you create; lead collaboration efforts with internal and external IT service providers and business units in evaluating and gathering technical requirements for business clients information security initiatives.
  • Operationalize indicator of compromise from intelligence feeds by developing, testing, and deploying monitoring and alerting rules into siem.
  • Be knowledgeable of network and security architecture principles, firewall and IDS/IPS fundamentals, endpoint security systems and other security protective/detective systems.