of networking, operating systems, SIEM, EDR and threat hunting tools to find adversaries, identify gaps in detection and cyber... be occasionally required to perform threat hunting work after hours or on weekends in support of a cyber incident or other threat...