security audits, monitor security systems, and investigate security breaches Develop and implement security protocols Experience with incident response and forensic analysis If you are passionate about cyber security
and requirements gathering; process analysis; investigation of existing functionality; gap analysis; participation