• Techniques for analyzing threat data.
  • Identifying patterns and indicators of compromise.
  • Utilizing analytical tools and methodologies.