- Utilize advanced search techniques, including social media and professional networks, to identify and
threats, including malware, phishing, ransomware, and social engineering attacks. Proficiency in security technologies
technical deployments. Participate in retrospective and post-implementation reviews. Work with team members to
practices in technical deployments. Participate in post-implementation reviews and process refinement. Work