Recognize, research, and analyze various threat actor groups/attack patterns, tactics, techniques and procedures. * Use data analysis to develop profiles of bad actors on X, and complete scaled
Create an account to see the full posting, access our search engine, and more.