. Operates vulnerability, compliance, and pen testing tools, and complies with security policies and procedures (T0028... information security plans, procedures, and control techniques designed to prevent, minimize or quickly recover from cyber-attacks...
. Operates vulnerability, compliance, and pen testing tools, and complies with security policies and procedures (T0028... information security plans, procedures, and control techniques designed to prevent, minimize or quickly recover from cyber-attacks...
Required: Bachelor's degree in Computer Science, Information Systems, Cyber Security, Engineering or related technical field and 8... background investigation prior to start Desired: Security certifications in incident response, cyber investigation...
Required: Bachelor’s degree in Computer Science, Information Systems, Cyber Security, Engineering or related technical field and 8... background investigation prior to start Desired: Security certifications in incident response, cyber investigation...