SEC504: Hacker Tools, Techniques, and Incident Handling

Analyzes network traffic and packet captures to detect anomalies and intrusions, while building advanced network detection rules and alerts.
Implements and maintains network services, including hardware and virtual systems, ensuring operational support for infrastructure platforms.
Supports Cyber Protection Team with infrastructure knowledge, mission scoping, and understanding of enterprise and tactical network systems.
Leads privacy program development and compliance oversight to ensure adherence to privacy laws, standards, and executive data protection needs.
Manages the design process of a product’s user interface to ensure it aligns with usability goals and delivers a seamless user experience.
Manages product development, coordinates cross-functional teams, and guides strategy, resources, and releases across product lifecycle phases.
Manages support resources and readiness for system components, ensuring operational capability through lifecycle logistics and maintenance.
Directs programs to meet mission goals, aligning teams and priorities while overseeing resources and success metrics for cyber initiatives.
Conducts research in systems/software engineering to develop capabilities and identify vulnerabilities, with security integrated throughout.
Analyzes new or existing software applications for security issues and provides actionable insights to improve protection and performance.