Job Description
Collaborates with users to discuss computer data access needs, to identify security threats and violations, and to identify and recommend needed programming or process changes.
Uses data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information.
Develops and implements plans to safeguard digital data from accidental or unauthorized modification, destruction, or disclosure; adheres to emergency data processing needs.
Reviews violations of security procedures; provides training to ensure violations do not recur.