Threat and Vulnerability Management
Utilize and apply proactive threat intelligence to support organizational security and perform vulnerability management activities
Software and Systems Security
Apply security solutions for infrastructure management and explain software & hardware assurance best practices
Compliance and Assessment
Apply security concepts in support of organizational risk mitigation and understand the importance of frameworks, policies, procedures, and controls
Security Operations and Monitoring
Analyze data as part of continuous security monitoring activities and implement configuration changes to existing controls to improve security
Incident Response
Apply the appropriate incident response procedure, analyze potential indicators of compromise, and utilize basic digital forensics techniques