... , and eradicate security incidents. Perform post-incident reviews and root cause ... detection rules, dashboards, and incident playbooks. Ensure alignment of business ... and maintain security documentation, including incident reports, configuration baselines, and ...
6 days ago