Identify and manage IT technology risks
 Monitor intrusions, system processes and network
 Implement enterprise systems securely
 Develop audit system and active system monitoring
 Vulnerability assessment and testing
 Manage security incidents and forensic analysis