TechnologyScope End-userdevicesincludingWindows,macOS,tablets,andperipherals. Microsoft365includingEntraID,Exchange,SharePoint,Defender,andendpointprotection. IdentityandAccessManagementincludingprivilegedandserviceaccounts. On-premisesandcloud-hostedservers. Networkinfrastructureincludingfirewalls,switches,wireless,andWANconnectivity. Cloud-hostedandsupplier-managedapplications. Documentation,Audit&ContinuousImprovement Produceclear,technicallyaccuratedocumentationcoveringincidents,rootcauseanalysis,andcorrectiveactions. Supportgovernance,customerassurance,andauditrequirements. Contributetopost-incidentreviewsandlessonslearned. Identifyrecurringissuesandrecommendlong-termimprovements. EnsureincidentsandvulnerabilitiesarecorrectlyloggedandtrackedwithinITSMsystems. Collaboration&Escalation WorkcloselywithIncidentManagers,Securityspecialists,andLevel3InfrastructureandNetworkteams. ActasaseniorescalationpointforLevel1andLevel2teams. Engagethird-partysupplierstoprogressinvestigationandremediation. Participateinout-of-hoursresponseasrequired. Knowledge,Skills ...