This position will maintain systems to protect data from unauthorized users, identifies, investigates, reports, and resolves security violations. Researches information security standards and technology trends. Conducts security and vulnerability analyses and risk assessments. Upgrades security systems by monitoring the security environment.