Monitor, assess, triage IT security events, anomalies and/or trends in threat landscape using internal and external logging and monitoring sources Evaluate the type and severity of security events by making use of packet analysis, log analysis, troubleshooting and understanding…