Owning the technical aspects of our internal security tools. Configurating, documenting, analyzing posture, providing recommendations, testing, deploying, debugging, raising issues, and feature requests. Assessing attack surfaces, weaknesses, vulnerabilities, mitigations, and...