...engineering activities.
Monitor and evaluate system compliance with Zero Trust policies, controls, and security standards.
Analyze cybersecurity data and system behavior to identify anomalies, risks, and potential threats.
Collaborate with cybersecurity engineers, ISSOs...