Design, configure, deploy, and manage cybersecurity technologies in response to malicious activities. Utilize SIEM, EDR, and other security technologies for incident response. Troubleshoot complex technical problems involving sophisticated cyber threats....