lyzing real traffic and associated artifacts: malicious, normal, and application traffic and demonstrate demonstrate the ability to differentiate malicious traffic from false positives
investigate incidents, and analyze system metrics, logs, traffic, and configuration changes. - Improve and maintain
Expert in TCP/IP, networking ports/protocols, traffic flow, OSI model, defence in-depth, and security