You will support our work automating cybersecurity operations, emulating adversary behavior, and improving the defensive postures of our sponsors. You'll evaluate tools and methodologies, assess adversary intent, develop cybersecurity analytics and other techniques to thwart or detect attacks, develop approaches to automate cybersecurity operations, and engage in research to improve the state of the practice.