protections, and related edge‑security controls. - Develop governance artifacts including runbooks, onboarding processes.... - Familiarity with perimeter security concepts (rate limiting, geo restrictions, bot management, edge logging/monitoring...