SEC504: Hacker Tools, Techniques, and Incident Handling

Performs collection, processing, and/or geolocation of wired and wireless networks to locate or track cyber targets through digital exploitation.
Coordinates cyber operations plans, working with analysts and operators to support targeting and synchronization of actions in cyberspace.
Provides software and hardware support for cyberspace operations by identifying vulnerabilities and developing cyberspace effect capabilities.
Uses tools to conduct navigation, forensics, and recon in support of offensive cyber ops; performs actions on-net when authorized and directed.
Analyzes intercepted intel to map target networks, assess value, and find exploitation strategies, focusing on comms tech and system implementation.
Collaborates to identify access and collection gaps using cyber resources and techniques to penetrate target networks and support mission operations.
Conducts host system analysis using built-in tools, evaluating services, permissions, and configurations to detect and address system threats.
Conducts system-level target development, maintains Electronic Target Folders, and runs collaborative working groups to support coordinated targeting.
Analyzes network traffic and packet captures to detect anomalies and intrusions, while building advanced network detection rules and alerts.
Supports Cyber Protection Team with infrastructure knowledge, mission scoping, and understanding of enterprise and tactical network systems.