of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation.... Review all relevant security documentation for the system to be assessed Review system-developed core security documentation...