Skills
Network & Security Architecture
-
IP Networking
-
TCP/IP
-
DNS
-
Route53
-
Firewalls
-
Load Balancing
-
Microservices
-
RESTful APIs
-
SaaS/PaaS/IaaS
-
Endpoint Prevention, Detection & Response (EDR/XDR)
-
Security Planning & Development
-
Zero-Trust Architecture
Cybersecurity & Threat Intelligence
-
Incident Response & Forensics
-
Detection & Response
-
SOC Optimization & Management
-
SecOps Automation (SOAR)
-
Risk & Vulnerability Assessment
-
Threat Hunting & Intelligence (OSINT)
-
Deception & Adversary Engagement
-
Dark Web Monitoring
-
Web Application Firewalls (Cloudflare, Akamai)
-
Identity & Access Management (IAM)
-
Security Operations
-
Compliance & Regulatory Knowledge (PCI, NIST, ISO 27001, CIS)
-
Packet Capture & Analysis
-
MITRE ATT&CK Framework
-
Malware Analysis
Penetration Testing & Offensive Security
-
Red Teaming
-
Social Engineering
-
Phishing
-
OSINT
-
Web App Security
-
Exploit Development
-
Reverse Engineering
-
Metasploit
-
Burp Suite
-
Nessus
-
Nexpose
-
OpenVAS
-
SET
-
Wireshark
-
Shodan
-
Responder
-
Velociraptor
-
Kali Linux
-
Nmap
Log Management, SIEM & Threat Intelligence Platforms
-
Log Correlation & Analysis
-
Continuous Monitoring
-
Security Information & Event Management (SIEM)
-
Splunk
-
Elastic Stack
-
Graylog
-
ThreatConnect
-
ThreatStream
-
Cyderes
-
Abnormal Security
-
Syslog-NG
-
Tcpdump
-
Logstash
Cloud Security & Virtualization
-
Cloud Security (AWS, Azure, Google Cloud)
-
CloudTrail
-
S3
-
Cloudflare
-
Akamai
-
Route53
-
Containerization & Orchestration (Docker, Kubernetes, Proxmox, VMware, VirtualBox)
-
Identity & Access Control
-
Remote Access (VPN, OpenVPN, MFA)
Operating Systems & Platforms
-
Linux (Ubuntu, CentOS, FreeBSD, PFSense, Kali Linux)
-
Windows
-
MacOS
-
Android
-
Cisco
-
Palo Alto
Languages & Scripting
-
Bash
-
PowerShell
-
Python
-
Perl
-
Ruby
-
VB
-
HTML
-
PHP
-
CSS
-
JavaScript
-
Git
Defensive Security & Endpoint Protection
-
Bit9/Carbon Black
-
CrowdStrike
-
SentinelOne
-
Cybereason
-
FireEye
-
Malwarebytes
-
McAfee
-
Symantec
-
Proofpoint
-
Protectwise
-
Qualys
-
ThreatStack
-
Vormetric
-
Bluecoat
-
Kace
Digital Forensics & Investigations
-
Autopsy / SleuthKit
-
Velociraptor
-
Cyber Triage
-
Memory, Disk, and Network Forensics
-
Incident Response
-
Root Cause Analysis
-
Breach Investigation
Data Management & Database Security
-
Microsoft SQL Server
-
PostgreSQL
-
SQLite
-
MongoDB
-
Elasticsearch
-
Kafka
-
Log Analysis & Data Correlation
Networking & Infrastructure Tools
-
Active Directory
-
Group Policy Objects
-
IPSEC
-
ISC-DHCP
-
Apache
-
Nginx
-
IIS
-
Bind
-
OpenSSL
-
Postfix
-
Squid
-
Akamai
-
OpenVPN
-
Zabbix
-
Nagios
-
MRTG
IoT & Embedded Systems
-
Arduino
-
Embedded Security
-
Hardware Hacking