aintain the confidentiality, integrity and availability of data information. Protect all computer systems against unauthorized or modified access. Functions & Responsibilities: Protect all computer systems against unauthorized access through various computer tools Vulnerability scanning and evaluation on computers and servers File integrity monitoring: modification and creation on critical servers such as local databases and insurance companies. Threat monitoring such as viruses and malware through suitable systems Web traffic monitoring and content filtering through the company's entire web filter Encryption and security of email Manage the authentication system Management of Source Fire IPS, intrusion prevention system and intrusion detection system in the network. Perform access audits based on the PCI Compliance requirement requested by the auditor.