Build and maintain security tooling, implement identity controls, develop automated checks for insecure configurations, and support secure handling of data