Security Risk Management Associate

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

After a security breach, organizations often are left trying to answer the public’s questions of why none of the risks were considered in advance. Sometimes a breach occurs because someone forgot to follow policy, but most times there simply was no policy in place. The Security Risk Management Associate plays an important role in developing and implementing the security policies that will protect the enterprise’s technology infrastructure from cyber security risks with a focus on vulnerability management, threat assessment and incident response.

The specific responsibilities of the Security Risk Management Associate include the following:

  • Monitoring and assessing events and taking action to mitigate threats.
  • Performing comprehensive infrastructure security risk assessments and identifying and mediating gaps.
  • Performing vulnerability scanning at regularly scheduled intervals; assessing vulnerabilities and tracking remediation actions and status.
  • Assessing new applications and technology for vulnerabilities; identifying and closing gaps.
  • Monitoring daily external threat intelligence reports.
  • Consolidating and monitoring the status of all vulnerability-related activities.
  • Monitoring security logs for high volume, high risk, and persistent threats; analyzing trends and addressing risks.
  • Developing and reporting information security metrics.
  • Researching and proposing solutions for emerging security threats and new technology.

 

General Educational Requirements

A Bachelor’s Degree generally is the minimum educational requirement for the position of Security Risk Management Associate. However, some employers require only a High School Diploma, GED or Equivalent Certification, or military experience combined with at least five years of Information Security experience. Industry certifications in specific areas almost always are required.

 

Additional Qualifications

In addition to solid security risk management experience, the Security Risk Management Associate must demonstrate the ability to communicate verbally and in writing to be able to present complex technical security concepts to non-technical audiences. The Associate also must demonstrate the flexibility to respond to security risks and threats on a 24/7 basis.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

DUHK: The Technique That Got the VPN Compromised
Views: 2704 / December 10, 2017
What is Docker? [Series]
Views: 2976 / December 9, 2017
Wanna-Cry Ransomware
Views: 2832 / December 9, 2017
The Abyssal Depth of the Deep Web
Views: 2771 / December 8, 2017
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel