integration vendor management application security security administration risk management vulnerability management management brinell scale troubleshooting scheduling nessus writing research symantec endpoint protection risk register vulnerability assessment computer engineering access network nmap vulnerability cyber security access control metasploit auditing phishing jira siem communications splunk operations security log acting infrastructure authorization certified ethical hacker wireshark enhanced digital access communication system (edacs) active directory risk management framework