"tomated systems are secure from unauthorized use, viral infection, and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability, or would compromise other aspects of overall system security.Participates in, and/or performs, the planning, design, implementation, and/or management of an agency-wide enterprise network that integrates, aligns," . . . .