seeking to build in security during the development stages of software systems, networks and data centres looking for vulnerabilities and risks in hardware and software finding the best way to secure the IT infrastructure of an organisation building firewalls into network infrastructures constantly monitoring for attacks and intrusions when the cyber security specialist finds a potential threat or attempted breach, closing off the security vulnerability identifying the perpetrator and liaising with the police if necessary