and requirements gathering; process analysis; investigation of existing functionality; gap analysis; participation
address potential security threats. Monitor and investigate security incidents, breaches, and suspicious
security audits, monitor security systems, and investigate security breaches Develop and implement security