Review access methods and procedure to improve and processes and overall security posture. Design and support change management processes and review approval design and documentation. Oversee and design application security, access control and corporate data safeguards. Design and communicate security requirements for our networks.