Write the Overview and Structure of ‘Omega Security’ (Proposed name of the company) using at least 800 words. The details should cover: What is the mission of Omega Security is? How Omega Security is structured? What are the job roles and responsibilities of the different parts/units of Omega Security and the different employees of Omega Security? How the roles and responsibilities of each unit and/or employee fit together into the mission of Omega Security? Are there different levels of employees, such as managers and lower level workers who will have different information technology needs? I need to provide the big picture view of Omega Security in this draft. Later this information will be used in the final draft, we will need to discuss the information technology of Omega Security’s proposed business in more detail. But here we are just trying to get a big picture of Omega Security itself and how everybody fits together to fulfill the mission of the Omega Security. The organizational overview section should describe the structure of the business that we are proposing, focusing on the different levels of employees in the organization (upper management, middle management, operational management, and lower level employees, such as production and service workers, and data workers) and their IT needs.Omega Security is based on providing network and host security to small businesses. The Omega Security will provide a tiered approach to support small businesses and infrastructure with detailed security on the status of network and devices. The security of the business will also include providing the support of applications being used within the business.The name of the business is “The business that I propose to create is based on providing network and host security to small businesses. The business will provide a tiered approach to support small businesses and infrastructure with detailed security on the status of network and devices. The security of the business will also include providing the support of applications being used within the business.The name of the business is “Omega Security” Upper Management will constantly be considering the ways that the company will be implementing the new security needs of the customer in relation to the services that are being offered. New security needs will be identified through the close communication taking place between the middle managers identifying new threats which have been found to be exploiting network and users. Operational managers will be communicating the information associated with the customers that we are supporting. The information would be related for example to systems not being patched at the proper levels, security measures not being properly implemented on the devices, and users inducing security incidents, etc. Lower level employees would be the analysts responsible for monitoring the traffic associated with our customers. Analysts would be broken out into sections such as network analysts, and host analysts. My proposed employee roster would include: 3 Upper level managers, 4 middle mangers, 3 operations managers, 9 Lead Analysts, and 40 lower level analysts. The business will use the Splunk as the main tool for analyzing data present within its customer’s organizations. (Security Onion) The Snort IDS will be used to monitor network traffic. Helix with Sleuthkit/Autopsy will be used for host forensics. Tools such as Suricata, Sguil, Squert, Snorby, Bro, NetworkMiner, Xplico will also be primary suite of tools used for Cyber defense. The company will also provide support for monitoring of the security cameras and alerts within the premises of the business. OmniSure will provide vulnerability assessments of the organizations through the use of penetration testing by leveraging MetaSploit and Kali. Splunk will be the primary tool responsible for bringing together all the various device outputs. The information provided by the support equipment previously mentioned within question 4 will be gathered and organized into automated reports that would give us insight into the status of each of our customer’s security postures. Often organizations have been known to use a Security Information and Event Manager such as the one offered by ArcSight to accomplish this task, but today there are other more reasonable solutions available to accomplish an Enterprise level security solution such as Splunk. Our organization will have a Lead Analysts who would keep in close communication with the operations manager. The Lead Analysts would be present within a dayshift, swingshift, and midshift schedule. The Network and Host level Lead Analysts sections would work together in order to verify continuity of operations exists. Operations would entail the monitoring of traffic and network devices, along with the host level analysis in relation to the activity. Lead Analysts would ensure the analysts are performing the necessary tasks for securing customer information and infrastructure. A vulnerability assessment team will have a Lead Analyst within its section as well. They will conduct the scanning of the devices within the organizations to ensure they not vulnerable to some of the known attacks found in the wild. The Lead analysts will work with the Operations managers who will look at the big picture of what is taking place within each of the sections and formulate the necessary measures that should be taken in order to efficiently defend our customers. The Operations manager will take their findings to the middle manager who will make recommendations to customers on updates or upgrades necessary for properly securing their information. The Operational manager will also be responsible for continuation training associated. They would be the experts who know the operations taking place on a day to day basis. They would be the ones who after analyzing the information within their respective sections would then look to provide the Lead Analysts the perspective necessary for oversee the lower level analysts doing the analysis. It would only make sense that both the Operations manager and Lead analysts be the experts.I have already completed an Abstract and Introduction as well that I will provide you as well.