• Identifying and analyzing malware threats.
  • Containment, eradication, and recovery from malware incidents.