Red Roof Inn
–
Columbus, OH
... • Leverage security data from internal sources (IDS, routers, SIMS, Firewalls, hosts) and external sources (Industry portals, threat intel feeds, etc..) to identify high priority alerts and develop/implement proactive mitigations. • Review security ... - Apr 23