, and maintains information security tools and solutions. Installs and configures intrusion detection systems, endpoint monitoring... as management of authentication and access controls. Evaluates information security configurations when intrusions have occurred...