- Required for role - Nice to Have - In an ideal world
| Security infrastructure engineer | |
|---|---|
| Reporting skills | 2 |
| Summary technical knowledge | 2 |
| Presentation Skills | 0 |
| Security-to-Business Integration | 2 |
| Training Materials | 0 |
| Networking Basics | 2 |
| Network protocol fundamentals | 2 |
| Web App Basics | 1 |
| Web Protocol Basics | 1 |
| Infrastructure Basics | 2 |
| WiFi hacking Basics | 0 |
| Radio Hacking | 0 |
| RFID hacking | 0 |
| Android Hacking | 0 |
| Apple iOS Hacking | 0 |
| Exploit Development | 0 |
| Tool Development | 2 |
| Social Engineering | 0 |
| Advanced Locksport | 0 |
| OSINT | 0 |
| Red Team Physical Access | 1 |
| Windows Sandbox/Desktop Breakout | 0 |
| Linux Sandbox/Desktop breakout | 0 |
| GDPR Basics | 1 |
| ISO27001 Basics | 1 |
| PCI DSS Basics | 1 |
| Embedded System basics | 0 |
| IoT Fundamentals | 0 |
| GDPR | 0 |
| ISO27001 | 0 |
| PCI DSS | 0 |
| Basic Dynamic Binary Analysis | 0 |
| Basics of Static Analysis | 0 |
| Binary Reverse Engineering - x86 | 0 |
| Binary Reverse Engineering - ARM | 0 |
| Binary Reverse Engineering | 0 |
| SIEM | 2 |
| SIEM configuration and content management | 2 |
| Principles of secure network design | 2 |
| Advanced Network Protocol Analysis | 1 |
| Advanced Windows Networking topics | 1 |
| Windows Secure Configuration | 1 |
| Linux Secure Configuration | 1 |
| Perimeter Security Device Configuration | 2 |
| Data Science and Advanced Data Analysis Techniques | 1 |
| Machine Learning | 0 |
| Intrusion detection principles | 2 |
| Advanced Intrusion Detection techniques | 2 |