, security trends, and techniques in cyber threats and hacking methodologies. e) Conduct research on emerging threats... and vulnerabilities and provide recommendations for enhancing the organization's security posture. f) Conduct proactive threat hunting...