Look for and analyze system and network data looking for cyber security weaknesses and intrusion attempts. This involves using logs from networking devices and various operating systems such as Windows and Linux. Conducting analysis of network traffic looking for anomalous behaviors and access points into network.s