<h3 class="uui-heading-subheading">Vulnerability Assessment</h3><div class="jtbd-card"><div class="jtbd-card-single">Performing regular network vulnerability scans with automated tools.</div><div class="jtbd-card-single">Conducting manual penetration testing on critical applications.</div><div class="jtbd-card-single">Identifying misconfigurations in cloud environments and services.</div><div class="jtbd-card-single">Analyzing security bulletins for relevant vulnerabilities affecting systems.</div></div><h3 class="uui-heading-subheading">Risk Management</h3><div class="jtbd-card"><div class="jtbd-card-single">Developing and updating threat modeling sessions for key products.</div><div class="jtbd-card-single">Assessing and prioritizing risks associated with third-party vendors.</div><div class="jtbd-card-single">Creating risk assessments and mitigation plans for projects.</div><div class="jtbd-card-single">Conducting regular audits of security controls and compliance measures.</div></div><h3 class="uui-heading-subheading">Incident Response</h3><div class="jtbd-card"><div class="jtbd-card-single">Establishing incident response protocols and playbooks for teams.</div><div class="jtbd-card-single">Coordinating incident response drills and tabletop exercises.</div><div class="jtbd-card-single">Investigating and analyzing security incidents in real-time.</div><div class="jtbd-card-single">Documenting incident response activities for future reference.</div></div><h3 class="uui-heading-subheading">Security Awareness and Training</h3><div class="jtbd-card"><div class="jtbd-card-single">Designing security awareness training programs for employees.</div><div class="jtbd-card-single">Conducting phishing simulation exercises to test user awareness.</div><div class="jtbd-card-single">Delivering presentations on emerging threats and best practices.</div><div class="jtbd-card-single">Evaluating effectiveness of training through assessments and feedback.</div></div>