cloud security and compliance
cyber security
develop defence policies
DevSecOps
execute ICT audits
handle cybersecurity incidents
ICT security standards
identify ICT system weaknesses
identify security threats
implement a firewall
maintain ICT identity management
penetration testing tool
Risk Management