175
Skill
Skill in developing and deploying signatures.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 175 |
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.