Write the Overview and Structure of “Omega Security” (Proposed name of the company) using at least 800 words.  The details should cover: What is the mission of Omega Security is? How Omega Security is
structured? What are the job roles and responsibilities of the different
parts/units of Omega Security and the different employees of Omega Security? How the roles and responsibilities of each unit and/or
employee fit together into the mission of Omega Security? Are there
different levels of employees, such as managers and lower level workers
who will have different information technology needs? I need to provide the big picture view of Omega Security in this draft. Later this information will be used in the final draft, we will need to discuss the information technology of Omega Security’s proposed
business in more detail. But here we are just trying to get a big picture
of Omega Security itself and how everybody fits together to fulfill
the mission of the Omega Security. The organizational overview section
should describe the structure of the business that we are proposing,
focusing on the different levels of employees in the organization (upper
management, middle management, operational management, and lower level
employees, such as production and service workers, and data workers) and
their IT needs.Omega Security is based on providing network and
host security to small businesses.  The Omega Security will provide a tiered
approach to support small businesses and infrastructure with detailed
security on the status of network and devices.  The security of the
business will also include providing the support of applications being
used within the business.The name of the business is “The
business that I propose to create is based on providing network and
host security to small businesses.  The business will provide a tiered
approach to support small businesses and infrastructure with detailed
security on the status of network and devices.  The security of the
business will also include providing the support of applications being
used within the business.The name of the business is “Omega Security”
 
Upper Management will constantly be considering the ways that the
company will be implementing the new security needs of the customer in
relation to the services that are being offered.  New security needs
will be identified through the close communication taking place between
the middle managers identifying new threats which have been found to be
exploiting network and users.  Operational managers will be
communicating the information associated with the customers that we are
supporting.  The information would be related for example to systems not
being patched at the proper levels, security measures not being
properly implemented on the devices, and users inducing security
incidents, etc.  Lower level employees would be the analysts responsible
for monitoring the traffic associated with our customers.  Analysts
would be broken out into sections such as network analysts, and host
analysts.  My proposed employee roster would include: 3 Upper level
managers, 4 middle mangers, 3 operations managers, 9 Lead Analysts, and
40 lower level analysts.
 
The business will use the Splunk as the main tool for analyzing data
present within its customer’s organizations.  (Security Onion) The Snort IDS will be used
to monitor network traffic.  Helix with Sleuthkit/Autopsy will be used
for host forensics.  Tools such as Suricata, Sguil, Squert, Snorby, Bro,
NetworkMiner, Xplico will also be primary suite of tools used for Cyber
defense.  The company will also provide support for monitoring of the
security cameras and alerts within the premises of the business. 
OmniSure will provide vulnerability assessments of the organizations
through the use of penetration testing by leveraging MetaSploit and
Kali. 
  Splunk will be the primary tool responsible for bringing together all
the various device outputs.  The information provided by the support
equipment previously mentioned within question 4 will be gathered and
organized into automated reports that would give us insight into the
status of each of our customer’s security postures.  Often organizations
have been known to use a Security Information and Event Manager such as
the one offered by ArcSight to accomplish this task, but today there
are other more reasonable solutions available to accomplish an
Enterprise level security solution such as Splunk.
 
Our organization will have a Lead Analysts who would keep in close
communication with the operations manager.  The Lead Analysts would be
present within a dayshift, swingshift, and midshift schedule.  The
Network and Host level Lead Analysts sections would work together in
order to verify continuity of operations exists.  Operations would
entail the monitoring of traffic and network devices, along with the
host level analysis in relation to the activity.  Lead Analysts would
ensure the analysts are performing the necessary tasks for securing
customer information and infrastructure. A vulnerability assessment team
will have a Lead Analyst within its section as well.  They will conduct
the scanning of the devices within the organizations to ensure they not
vulnerable to some of the known attacks found in the wild. The Lead
analysts will work with the Operations managers who will look at the big
picture of what is taking place within each of the sections and
formulate the necessary measures that should be taken in order to
efficiently defend our customers. The Operations manager will
take their findings to the middle manager who will make recommendations
to customers on updates or upgrades necessary for properly securing
their information.  The Operational manager will also be responsible for
continuation training associated.  They would be the experts who know
the operations taking place on a day to day basis.  They would be the
ones who after analyzing the information within their respective
sections would then look to provide the Lead Analysts the perspective
necessary for oversee the lower level analysts doing the analysis.  It
would only make sense that both the Operations manager and Lead analysts
be the experts.I have already completed an Abstract and Introduction as well that I will provide you as well.




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.