1. Security monitoring and response: Real time monitoring of security events and threat intelligence on the platform. -Real time monitoring of security events and threat intelligence on the platform, identifying potential attacks and abnormal behavior. -Emergency response for handling security incidents, analyzing and tracking security incidents, and developing and implementing effective defense strategies. 2. Vulnerability management and risk assessment: - Conduct regular security assessments, vulnerability scans, and penetration testing to identify potential vulnerabilities in systems and applications. -Report, track, and verify security vulnerabilities to ensure timely remediation. 3. Blockchain security audit: Monitor and audit potential security issues and vulnerabilities in internal applications and third-party services. -Monitor and analyze abnormal transaction behavior on the blockchain network to prevent potential attacks and abuse. 4. Security policy and standard development: - Participate in the development and optimization of the company's security policies, standards, and processes to improve overall security levels. 5. Threat Intelligence and Technology Research: Continuously track the latest security threats, vulnerabilities, and attack methods in the blockchain industry, and provide forward-looking security recommendations. -Research the development of security technology in the Web3 field, explore new protection mechanisms and solutions.