Close

Reply To: OCU ISCAP A Week 02 Lesson 06 Discussion

#91834
Aaron Elliott
Participant

Opening position: Operations Security Management.

Role Responsibilities:
Operations Security Managers are responsible for keeping up with the latest security software updates and configure patches to fit business needs. Managers will be expected to maintain logs and record keeping, along with analyzing logs and securing log data from tampering. Logs will be required to be backed up in case of data loss and adhere to the companies record retention policy. Create a change control process to document changes to operations, including who, why and when the change was made. Managers will need to maintain a schedule of preventative maintenance, with the goal to avoid emergency maintenance, this will relate to proper schedule upkeep for future concerns that may arise. Also, managers will have to upkeep a system of redundancy to avoid points of failure, for example a RAID storage system in case of hard drive failure, and backups of network images. Managers need to manage associates from being failure points by cross training and separation of duties.

Daily tasks include:
Fixing hardware and software issues, among other information technology issues. Maintaining security checks and backups are performed. Handling of any incident reports, like security breaches, anomalies found in logs etc. Daily tasks needed to maintain desired performance of networks and security measures.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!