team responsible for the trusted operating system, secure network encryptors (layer 2/3), Public Key Infrastructure Good understanding of networking and network security is a must; knowledge of cryptographic principles environment) Good understanding of networking and network security Systematic and analytical approach to problem