Analyzes and implements security configurations, performs audits and log analysis, and advises clients on IT risk and cybersecurity challenges.