...responding to security threats and incidents, acting individually and as part of a team to resolve issues. Deploy and/or build software to enable new detection capabilities. Proactively identify malicious activity by analyzing logs, packets, and alerts for signs...