- Support in security assessment and risk management, especially those related to ICT.
- Develop and implement information security plans and device and software policies (DLP/IDS/IPS/EDR/Threat Hunting).
- Accomplish investigations in terms of data, computer and server security.
- Planning and implementing data, voice and image security systems.
- Establishing internal and external relationships, along with implementing new security technology that is right on target.