Correlates threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential...
* Respond to cyber incidents, including responding to SOC IR phone calls and SOC emails
* Act as a Subject Matter Expert in investigations for potential...