Analyze industry trends and outline potential impact to the enterprise
edit
New security systems and services
edit
Technology evolution (e.g. RFCs, ISO)
edit
Situational awareness
edit
Latest client-side attacks
edit
Integration within the business (e.g. advising on the placement of company material for the general public)
edit
Emerging threat sources
edit
Research security requirements for contracts
edit
Request for Proposal (RFP)
edit
Request for Quote (RFQ)
edit
Carry out relevant analysis for the purpose of securing the enterprise
edit
Prototype and test multiple solutions
edit
Cost benefit analysis (Return on Investment - ROI, Total Cost of Ownership - TCO)
edit
Analyze and interpret trend data to anticipate cyber defense aids
edit
Review effectiveness of existing security
edit
Reverse engineer / deconstruct existing solutions
edit
Analyze security solutions to ensure they meet business needs
edit
Availability (MTTR- Mean Time To Recovery, MTBF- Mean-Time Between Failure)
edit
Conduct a lessons-learned / after-action review
edit
Use judgment to solve difficult problems that do not have a best solution
edit
Conduct network traffic analysis
edit