1. Develop unique, effective security strategies for software systems, networks, data centers, and hardware 2. Implement/build-in security systems to software, hardware, and components 3, Research best ways to secure company-wide IT infrastructure 4. Build firewalls to protect network infrastructures 5. QA software and hardware for security vulnerabilities and risks 6. Monitor software for external intrusions, attacks, and hacks 7. Close off security vulnerability in the case of an attack 8. Identify cyber attackers, report to upper management, and cooperate with police or other legal forces to detain perpetrator