- Utilize advanced search techniques, including social media and professional networks, to identify and
threats, including malware, phishing, ransomware, and social engineering attacks. Proficiency in security technologies
- provide support services and ensure server availability during operating hours. Business Requirements