Knowledge of Virtual Private Network (VPN) security.
Core KSAT for the following Work Roles
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.