requires a deep background in identifying and addressing security vulnerabilities, implementing effective security protocols... to security incidents while maintaining a secure IT environment that upholds the confidentiality, integrity, and availability...