Identify, analyze, and track advanced threat actors targeting cloud environments. Conduct threat hunting across diverse data sources. Leverage open-source and proprietary data to track attacker infrastructure and malware. Investigate and attribute security incidents, campaigns, and threat actors. Communicate novel findings to internal teams, customers, and the public. Collaborate with engineering, product, and operations teams to inform cloud security strategies.