... administer, and use cybersecurity tools, systems, and applications; develop policies, ... , administer, and support security systems and infrastructure to include endpoint ... , intrusion detection and prevention systems, application layer and traditional ...
12 days ago