Podcast
Questions and Answers
Which security measures were implemented to enhance system security?
Which security measures were implemented to enhance system security?
- Introduction of antivirus software
- Installation of Darktrace security appliances (correct)
- Implementation of a firewall system
- Adoption of network monitoring tools
What tool was used for managing server backups?
What tool was used for managing server backups?
- Veeam (correct)
- Backup Exec
- Carbonite
- Acronis True Image
What compliance frameworks were the individual involved with?
What compliance frameworks were the individual involved with?
- NIST and PCI DSS
- ITIL and ISO 9001
- COBIT and GDPR
- ISO 27001 and Cyber Essentials Plus (correct)
Which qualifications have been achieved by the individual related to Cyber Security?
Which qualifications have been achieved by the individual related to Cyber Security?
What aspect of IT did the individual's previous role focus on?
What aspect of IT did the individual's previous role focus on?
What type of support does a Service Desk Analyst primarily provide?
What type of support does a Service Desk Analyst primarily provide?
Which security control was implemented in the 365-security posture assessment?
Which security control was implemented in the 365-security posture assessment?
What was one of the responsibilities held while working as an IT Analyst for Tier1 Asset Management?
What was one of the responsibilities held while working as an IT Analyst for Tier1 Asset Management?
What is an ongoing task related to security that the analyst participates in daily?
What is an ongoing task related to security that the analyst participates in daily?
During previous experience, what networking equipment was the analyst responsible for installing?
During previous experience, what networking equipment was the analyst responsible for installing?
Flashcards
Multi-factor Authentication (MFA)
Multi-factor Authentication (MFA)
A security measure that requires users to provide two or more forms of authentication, such as a password and a code from a mobile app, to access an account.
Blocking Legacy Authentication
Blocking Legacy Authentication
A security method that prevents users from accessing accounts using outdated authentication protocols considered less secure.
Phishing Controls
Phishing Controls
A type of security technology designed to protect against phishing attacks by detecting and blocking suspicious emails and links.
VLANs (Virtual Local Area Networks)
VLANs (Virtual Local Area Networks)
Signup and view all the flashcards
Network Switches
Network Switches
Signup and view all the flashcards
What is Darktrace?
What is Darktrace?
Signup and view all the flashcards
What is Windows Defender for Endpoint?
What is Windows Defender for Endpoint?
Signup and view all the flashcards
What is Cyber Essentials Plus?
What is Cyber Essentials Plus?
Signup and view all the flashcards
What is ITAD?
What is ITAD?
Signup and view all the flashcards
What is ISO 27001?
What is ISO 27001?
Signup and view all the flashcards
Study Notes
Service Desk Analyst Role at Vertas Group
- Current role: 1st/2nd line support for over 4000 employees, involved in technical projects (infrastructure to security).
- Example project: 365 security posture assessment, implemented technical controls (MFA, blocking legacy authentication, phishing controls).
- Security involvement: Educating users on cyber awareness, responding to security alerts (Sophos, Egress).
- Learnings: Understanding IT operations in large organizations, close collaboration with security team.
- Previous role: IT Analyst for Tier1 Asset Management (2 years).
- Infrastructure work: Building servers (on-prem Hyper-V and Azure), installing/maintaining networking equipment (Cisco Meraki access points, switches, firewalls), creating guest networks, VLANs, and configuring access control lists.
- Security appliance installation: Installed Darktrace security appliances at multiple sites.
- Backup and patching: Managed server backups (Veeam), endpoint and server patching (Endpoint Central).
- Security compliance: Involved in technical compliance for ISO 27001 and Cyber Essentials Plus, developing documentation, successful audits.
- Project role: Project services engineer for EOL IT Services.
- Field support: Travels to client sites (UK) for technical managed services and field tech support.
ITAD (IT Asset Disposal) Experience
- Previous company: IT asset disposal (ITAD) company.
- Responsibilities: Responsible decommissioning IT equipment.
- Cyber security interest: Active interest in cyber security, involvement through learning sites (TryHackMe) and podcasts (Security Now).
- Certifications: CompTIA A+, Network+, and Security+ (most recent).
- Ongoing learning: Studying for Cisco CCNA certification, looking to increase cyber security involvement.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.