Conducts threat and vulnerability assessments and determines deviations from acceptable configurations or policies; Installs, configures, troubleshoots, and maintains server, systems configurations (hardware and software), and systems to ensure their confidentiality, integrity, and availability.