Implement advanced security technology (SIEM, network packet monitoring, intrusion detection, database activity monitoring). Integrate security systems into operational products and hosting environments. Develop security policies, procedures, run books, and training materials. Operate, monitor, and optimize threat detection and prevention technologies. Develop and implement technical interfaces for security log data. Identify security vulnerabilities and design/execute remediation plans. Respond to alerts by recommending configuration changes. Maintain security policies, operational procedures, runbooks, and documentation.