The role involves planning, implementing, upgrading, and monitoring security measures to protect computer networks and information. The individual will ensure that appropriate security controls are in place to safeguard digital files and vital electronic infrastructure, and will respond to computer security breaches and viruses. The position requires the rigorous application of cybersecurity policies, principles, and practices in delivering all Information Technology (IT) and cybersecurity services. The candidate will develop and design security solutions to maintain the confidentiality, integrity, and availability of information throughout the enterprise. They will identify, plan, and document improvements to security controls, and develop recommendations and courses of action (COAs) to solve complex cybersecurity problems. Additionally, the role includes planning and scheduling the installation of new or modified security hardware, operating systems, and software applications, and ensuring the assessment and implementation of identified computer and network environment fixes as part of the Cybersecurity Vulnerability Management program. The candidate will guide the implementation of appropriate operational structures and processes to ensure an effective cybersecurity program.