Skills:
Writing, Key Management, Ids, Prophet, Ceh, Infrastructure, Technical Analysis, Windows, Vulnerability, Trend Analysis, Network Diagrams, Penetration Testing, Briefings, Intelligence Systems, Security Controls, Data Mapping, San, Data As A Service, Concept of Operations, Violations, Network Security, Cyber Operations, Law Enforcement, Developmental, Assessment, Cantonese, Detection, Accessibility, Management, Cyber, Vulnerability Assessment, Science, Engineering Analysis, Security, Information Assurance, Sensitivity, Integration, Routers, Initiation, Handheld Devices, Information Systems, Alerts, Publications, Defense, Source, Accounting, Linux, Sdlc, Telephone Systems, Human Resources, Baseline, Methodology, Cissp, Incident Response, Fusion, Networking, Posture, Local Area Network, Sun Microsystems, Software Requirements, Manuals, System, Cell, Switches, Visualization, Validation, Threat Analysis, Reports, Inventory, Testing, Training, Policy, Point of Contact, Enterprise Software, Virtual, Comsec, Solaris, Documentation, Ingenuity, Mitigation, Research, Trains and Add Rails, Reporting, Stakeholders, Internet Security, Commercial Real Estate, Investigation, Guides, Analysis, Drawing, Legal Issues, Countermeasures, Compliance Reporting, .Net, Information Technology, Scrm, Information Security, Safeguarding, Accreditation, Interoperability, Yahoo, Mitigation Strategies, Configurations, Evaluations, Operating Systems, Dissemination, Applications, Appliances, Threat Assessment, Iam, Communication, Home, Schedules, System Administration, Advertising, Operations, Subject Matter Experts, Risk Assessment, Group Activities, Social Influence, Interagency, Technical Support, Security Clearance, Lockheed Martin, Data Driven Testing, Project, Analysis Reports, Contractual Agreements, Computer Networking, Engagement, Low Level Programming, Classroom, Technology Transfer, Unix, Dod, Servers, Identity, Presentations, Nature, Ancillary, Council, Firewalls, Regulations, Security Certification, Intelligence Community, Intelligence, Classification, Nsa, Security Engineering, Intrusion Detection, Estimate, Defensive, Threat, Espionage, Army, Software Installation, Network Connectivity, Physical Security, Testers, Government, Investments, Computer Security, Coordinate, Bridge Inspection, Concerts, Compliance, Addressing, Requirement Specifications, Compromise, Network Communications, Test Procedures, Military, Cots, Deployed, Product Demonstration, Scanners, Directives, Test Environments, Risk, Wireless, Civilian, Biometrics, Mandarin, Iss, Architecture, Investment Decisions, Evaluation, Conclusions, White Papers, Databases