Assigned to a multi‑tenant security bureau, I orchestrated an operation where clients filed their digital assets and our systems surveilled vulnerabilities around the clock. From cloud agents to endpoints and web applications, evidence was collected, correlated, and presented with clear, actionable findings.