If I noticed suspicious activity on the company network, my first priority would be to take immediate action to protect the system. This includes isolating any affected systems from the rest of the network and disabling any accounts that may have been compromised. Then, I would conduct a thorough investigation into the source of the issue, including reviewing logs and other security data. Finally, I would work with the appropriate teams to determine the best course of action for remediation and prevention. My goal is always to ensure the safety and security of the company’s data and networks.