Manage, deploy, and administrate all cybersecurity tools to include but not limited to Continuous Diagnostics and Mitigation (CDM), Zero Trust, Identity Credential Access Management (ICAM), Endpoint Detection and Response (EDR), Data Loss Prevention, Vulnerability Management & Scanning, Enterprise Logging, SIEM/SOAR, and Cloud Security technologies; Coordinate with System