Must have an understanding and ability to produce replication of user based activities (opening email, moving files, opening folders, etc,) to simulate activity on the Range. Assist with integrated, dynamic Cyber defense, coordinate and maintain security toolsets to support organizations' continuous monitoring and ongoing authorization programs, establish a framework by w