The position involves utilizing information gathered from various computer network defense resources, such as intrusion detection system alerts, firewall and network traffic logs, and host system logs. The primary responsibility is to identify, analyze, and report events that occur or may occur within the environment.