Analyze cyber threats, focusing on the Dark Web, researching malicious campaigns and attacker infrastructure, and creating detection rules.