cybersecurity incidents. Perform regular security assessments and vulnerability testing. Manage and configure
projects and major changes, including user needs assessment, implementation planning, specifications, tendering
technologies, industry trends, and best practices. Assess technical requirements for system implementations