- Utilize advanced search techniques, including social media and professional networks, to identify and
operate under pressure - must be a fast and accurate worker who is results driven.
Â
Why
threats, including malware, phishing, ransomware, and social engineering attacks. Proficiency in security technologies