- Required for role - Nice to Have - In an ideal world
Linux Secure Configuration | |
---|---|
Penetration Tester - Core Skills | 0 |
- Web App Specialist | 0 |
- Infrastructure Specialist | 0 |
- Mobile App testing specialist | 0 |
- Mobile Device testing/MDM | 0 |
- IoT/Device Testing Specialist | 0 |
- Windows Hacking Specialist | 1 |
Security Researcher | 0 |
Red Team Member | 1 |
- Physical Access Specialist | 0 |
- Threat Simulation Specialist | 1 |
Compliiance Manager | 0 |
- GDPR Specialist | 0 |
- ISO27001 Specialist/Assessor | 0 |
- PCI DSS Specialist/QSA | 0 |
Incident Responder - Core Skills | 1 |
Threat Intelligence - Core Skills | 2 |
- SIEM Specialist | 0 |
- Malware Analyst | 0 |
- Theat Intel Data Scientist | 0 |
Firewall Engineer | 1 |
Security Architect - Windows | 1 |
Security Architect - Linux | 2 |
SOC monitoring analyst | 0 |
SOC content developer | 0 |
Security infrastructure engineer | 1 |
Network Security Architect | 1 |
User Awareness Trainer | 0 |
Developer Awareness Trainer | 0 |