88934887
May 27, 2020
IT security, protection and restoration, namely, assessing, detecting, and preventing IT system vulnerabilities, security risks, and threats; Computer network, computer application, and data security consultancy; Security audits of computer networks, computer applications, and databases; Development of response plans for computer network security, computer application security, and data security incidents; Vulnerability testing and threat analysis of computer networks, computer applications, and databases for unauthorized access, malicious use, and cyberattack; Detecting, analyzing, reporting on, and protecting computer networks, computer applications, and databases from unauthorized access, malicious use, malware, and cyberattack; Detecting security breaches and malicious activities on computer networks, computer applications, and databases; Monitoring, tracking, collecting, and analyzing the activities of users of computer networks, computer applications, and databases; Evaluating the performance of security measures used to protect computer networks, computer applications, and databases; Performing compliance checks with computer security standards and certifications; Management of compliance with computer security standards and certifications, namely, storage, organization, and cataloguing of compliance documents, event logs, and task lists; Instruction and training regarding computer and database security audits, and compliance with computer security standards and certifications
Computer and Scientific