I do monitor organization's network for security breaches, investigate violation when occurred, install software for data encryption to protect sensitive information.I conduct penetration testing , research the latest security trend in information technology and develop security standards and best practices for an organization.