identified. Threats. Under guidance, develops solutions to data access, modification, disclosure, destruction or other risks... including remediating vulnerabilities, evaluate and approve firewall requests and VPN access, and coordinate password changes...