SEC504: Hacker Tools, Techniques, and Incident Handling

Responsible for planning, preparing, and executing system tests; evaluating test results against specifications and requirements; and reporting test results and findings.
Synthesizes intelligence for reporting, evaluates SIGINT/cyber collection, collaborates with analysts, and maintains databases and customer feedback.
Performs advanced analysis of collection and open-source data to track target activity, profile cyber behavior, and support cyberspace operations.
Responsible for providing technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational policies and processes.
Delivers technical support to users, helping them resolve issues with client hardware/software according to organizational service processes.
Responsible for managing a portfolio of technology investments that align with the overall needs of mission and enterprise priorities.
Responsible for conducting evaluations of technology programs or their individual components to determine compliance with published standards.
Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Responsible for collecting, processing, analyzing, and disseminating cybersecurity threat assessments. Develops cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment.
Monitor, test, detect, and investigate threats to cloud environments.
This expert applies new threat intelligence against existing evidence to identify attackers that have slipped through real-time detection mechanisms. The practice of threat hunting requires several skill sets, including threat intelligence, system and network forensics, and investigative development processes. This role transitions incident response from a purely reactive investigative process to a proactive one, uncovering adversaries or their footprints based on developing intelligence.