Possessing comprehensive technical knowledge of our internal security tools. Configurating, documenting, analyzing security posture, providing recommendations, testing, deploying, debugging, raising issues, and feature requests. Assessing attack surfaces, weaknesses, vulnerabilities, mitigations,...