- To configure and test security-related technologies.
- To troubleshoot and correct security data problems.
- To interface with internal or external parties regarding security policy standard violations.
- To maintain confidential records and documentation.
- To analyse network traffic.