Drive security initiatives ensure security is considered from design through implementation. Effectively utilize threat model to inform application design decisions. Perform security code review to validate vulnerabilities, exploitabilities, and adherence to security best practices. Triage application vulnerabilities and recommend remediation strategies. Purple team our application and demonstrate attack vectors. Improve security processes and tooling automation.