Collecting information about the systems and applications (Syslog, Snort, different SIEM solutions)
Processing and sorting mentioned gathered information (SIEM Application, McAfee IPS, Snort custom rules)
Evaluation and interpretation processed data and Implementing necessary actions
Developing configuration standards for all system components and applications to address security vulnerabilities. (Periodic vulnerability scans, Remediation activities, Source-code analyzes)
Testing systems and applications (Including Remediation Tests)
Business Continuity Management including Emergency and Incident Response
Maintaining company Information Security Policy and related procedures to meet the PCI, EU's Data Protection and AML Directives, and local compliance requirements.