Analysis Skills, Artificial Intelligence (AI), Authentication, Automation, CISM - Certified Information Security Manager, CISSP - Certified Information Systems Security Professional, Cloud Applications, Cloud Architecture, Cloud Computing, Computer Engineering, Computer Forensics, Computer Hacking, Computer Science, Computer Security, Cryptographic Protocols, Customer/Client Research, Data Analysis, Data Management, Data Sets, Desktop PC, DevOps, Federal Government, GCIA - GIAC Certified Intrusion Analyst, GCIH - GIAC Certified Incident Handler, GSLC - GIAC Security Leadership Certificate, Government, Government Requirements, Identify Issues, Improvement Metrics, Incident Response, Information Technology & Information Systems, Information/Data Security (InfoSec), Integrated Circuits (ICs), Internet Security, Internet/Online Service, Inversion of Control (IoC), Legal, Linux Operating System, Local Government, Machine Tool, Malware Analysis, Mathematics, Microsoft Exchange Server, Microsoft Product Family, Microsoft SharePoint, Microsoft Windows Azure, Microsoft Windows Operating System, Multiplatform/Cross-Platform, Noise Analysis, OAuth, Penetration Testing, Performance Metrics, Power BI, Problem Solving Skills, Public Key Infrastructure (PKI), Python Programming/Scripting Language, R Programming Language, Regulatory Requirements, Research Skills, Reverse Engineering, SQL (Structured Query Language), Security Assertion Markup Language (SAML), Security Clearance, Security Information and Event Management (SIEM), Sensitive Compartmented Information (SCI), Single Scope Background Investigation (SSBI), Skype, Software Development Lifecycle (SDLC), Splunk, Startup, Statistics, Team Player, Threat Modeling, Top Secret Clearance, Trend Analysis, United States Citizen, United States Department of Defense (DoD)