-24*7*365 triage, analysis and response-notable events & security alerts (including reported incidents via email or phone)
-Monitors on-boarded events and logs from critical applications, critical servers and databases (per asset priority framework), network based intrusion detection systems, endpoints, email, firewall and proxy servers, for potential security incidents and threat
-Assess the security impact of security alerts and traffic anomalies to identify malicious activities and take mitigation actions or escalates up to senior members of the team as appropriate.
...