Key responsibilities include collaborating with external protocol developers to audit code and secure cryptographic protocols implementation , conducting in-depth security research publishing findings through technical blog posts/conferences , identifying vulnerabilities in existing tools incorporating new knowledge into them staying up-to-date on latest advancements