systems to identify weaknesses and assess risk; performs vulnerability testing. Implements new or upgraded security measures... or controls, and documents system or process changes. Reviews security violation reports or logs, investigates possible security...