SEC504: Hacker Tools, Techniques, and Incident Handling

Acquires and manages resources, supports, and performs key industrial security protection while adhering to safety and engineering goals.
Ensures control system network security compliance and best practises for control networks.
Executes specific industrial incident response for incidents that threaten or impact control system networks and assets, while maintaining the safety and reliability of operations.
Builds and maintains business relationships with engineering staff and C-suite stakeholders by communicating and managing cyber-to- physical risks while reducing security risk to engineering operations and simultaneously prioritising safety.
Responsible for investigating, analyzing, and responding to network cybersecurity incidents.
This dynamic and fast-paced role involves identifying, mitigating, and eradicating attackers while their operations are still unfolding.
Designs and evaluates information system security throughout the software lifecycle to ensure confidentiality, integrity, and availability.
Oversees program, system, or enclave cybersecurity, ensuring protection from cyber threats and compliance with organizational standards.
Responsible for testing, implementing, deploying, maintaining, and administering infrastructure hardware and software for cybersecurity.
Responsible for identifying and assessing the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.
Security Operations Center (SOC) analysts work alongside security engineers and SOC managers to implement prevention, detection, monitoring, and active response. Working closely with incident response teams, a SOC analyst will address security issues when detected, quickly and effectively. With an eye for detail and anomalies, these analysts see things most others miss.