1) Planning, engineering, andmonitoring the security arrangements for the protection of thenetwork systems.
2) Identifying, monitoring, anddefining the requirements of the overall security of thesystem.
3) Creating different ways to solve theexisting threats and security issues.
4) Configuringand implementing intrusion detection systems and firewalls.
5) Testing and checking the system for weaknesses in softwareand hardware.
Thank you for reporting this job!
Your feedback will help us improve the quality of our services.