Develops security software, analyzes and assesses vulnerabilities within the infrastructure (Pc software package, parts, networks), investigates out there apps and countermeasures to cure the detected vulnerabilities, and endorses treatments and perfect strategies. Analyzes and assesses harm to the information/infrastructure resulting from protection incidents, examines to choose from Restoration devices and processes, and suggests methods. Assessments for compliance with stability strategies and processes. May Probably guidance Within the era, implementation, and/or administration of security solutions.