eradicationstrategy,andrecoveryvalidation. Driveincidentsthroughtofulltechnicalresolution,nottemporarymitigation. KeyAccountabilitiesVulnerabilityManagement Investigatevulnerabilitiesidentifiedviascanningplatforms,endpointandcloudtooling,supplierdisclosures,andauditactivity. Assessriskbasedonexploitability,exposure,andoperationalimpact. Ownremediationactionsend-to-end,coordinatingwithInfrastructure,Network,andthird-partysuppliers. Validateremediationandensureappropriateevidenceiscapturedforassuranceandaudit. Platforms&TechnologyScope End-userdevicesincludingWindows,macOS,tablets,andperipherals. Microsoft365includingEntraID,Exchange,SharePoint,Defender,andendpointprotection. IdentityandAccessManagementincludingprivilegedandserviceaccounts. On-premisesandcloud-hostedservers. Networkinfrastructureincludingfirewalls,switches,wireless,andWANconnectivity. Cloud-hostedandsupplier-managedapplications. Documentation,Audit&ContinuousImprovement Produceclear,technicallyaccuratedocumentationcoveringincidents,rootcauseanalysis ...