during security solution development and deployment Lead proof of value (PoV) assessment on potential security tools Review business..., and other partners to design optimal data security technology capabilities that are secure, efficient, scalable, resilient, and adaptable...