...organization’s overall IT system; it includes developing, implementing, and managing an... ...identify potential threats and intrusions. # Develop and implement security policies,... ...configure, maintain and develop security software and hardware, including firewalls, antivirus...