Ability to assess, harden, and mitigate cyber vulnerabilities through various tools such as Assured Compliance Assessment Solution (ACAS)/Nessus vulnerability scanner, Security Technical Implementation Guides (STIGs), and Security Requirement Guides (SRGs) related to COTS operating systems, applications, and network infrastructure devices. In depth understanding of networking concepts, hardware, and software with ability to provide system administration to equipment segregated from the internet (TCP/IP, routing, firewall configurations, CISCO switches, etc.).