Which of the following is primarily responsible for identifying vulnerabilities in an organization’s IT infrastructure?