Monitors and evaluates systems’ compliance with IT security requirements and provides advice and guidance in implementing IT security policies and procedures in the development and operation of network systems. Ensures the confidentiality, integrity, and availability of systems, networks, and data t...