Protects an organization's network infrastructure from cyber threats. Configures firewalls, VPNs, and intrusion detection systems.