endpoint detection and response malware analysis triage operations splunk security network security microsoft azure information security management trigger point vulnerability vulnerability assessment firewall incident response management threat detection internet security mitigation computer science business process improvement blender (device) jira siem phishing android (operating system) coordinating security log information technology catalyst linux admissions operation