Design, develop and implement automation tools, analytics and self-service system for IT operations. Provide advice and support for orchestration, automation and analytic technology and systems.
Research and develop concepts and cognitive methodologies in the area of information processing for structured/unstructured data to enhance information processing capabilities.
Formulate/Refine IT security policies. Perform IT security threat and risk assessments.
Conduct forensic investigations into breaches of infocomm security. Provide computer forensics and technical evidence to resolve computer security incidents and other investigation assignments.
Conduct security research on firmware design and architecture. Study proprietary appliances and hardware platforms to discover security vulnerabilities and threats.
Subject matter expert in the enterprise networking technologies. Design, plan, implement and manage secure multi-site network infrastructure to achieve high service availability and reliability.
Subject matter expert for installation, operation and maintenance of Windows/Linux on physical hardware and virtual environment and in the area of storage infrastructure and recovery of data services.
Provide second-level technical operational assistance to end users in troubleshooting and resolving complex end user access problems.
Perform day-to-day administration, operating, maintaining and monitoring of highly available secure infrastructure systems.
Provide first-cut analysis of cyber threat detection alerts with other information sources. Understand the tactics, techniques and procedure associated with major cyber threats.