Develop host security detection capabilities, including but not limited to intrusion detection rule operation, threat modeling..., and baseline modeling of host behavior for both office and production networks. Continuously optimize existing host security...