Use technical expertise to identify system, network, and application vulnerabilities, adjusting designs based on new threat data. Collaborate with Infrastructure and Application teams for security reviews, vulnerability assessments, and remediation....