Monitor and maintain DLP policies and procedures to prevent unauthorized access, use, disclosure, modification, or destruction of data Manage and configure various cyber technologies, such as firewalls, antivirus, encryption, VPN, SIEM, IDS/IPS, etc. Review and approve security requests, such as privileged access rights, firewall rules, software installation, etc. Analyze