anomalous activity and potential threats to network resources Coordinate with enterprise-wide cyber defense staff to validate... event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness...