{"id":430,"date":"2022-12-03T01:04:11","date_gmt":"2022-12-03T01:04:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/justice-gideon\/?page_id=430"},"modified":"2022-12-03T02:29:41","modified_gmt":"2022-12-03T02:29:41","slug":"skills-and-competencies-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/justice-gideon\/skills-and-competencies-2\/","title":{"rendered":"Skills and Competencies"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-1.png\" alt=\"\" class=\"wp-image-464\" width=\"753\" height=\"377\" srcset=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-1.png 600w, https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-1-300x150.png 300w\" sizes=\"(max-width: 753px) 100vw, 753px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Risk Management Framework (RMF) <\/h2>\n\n\n\n<ul><li> The framework allows for any industry with security concerns for their information systems and data to implement a secured environment through the steps in the framework to prevent their valuable assets from unauthorized persons.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-2.png\" alt=\"\" class=\"wp-image-469\" width=\"230\" height=\"221\" srcset=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-2.png 1024w, https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-2-300x289.png 300w, https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-2-768x740.png 768w, https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-2-600x578.png 600w, https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-2-945x910.png 945w\" sizes=\"(max-width: 230px) 100vw, 230px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability Management Analyst<\/h2>\n\n\n\n<p>Vulnerability management is the ongoing, regular process of identifying, assessing, reporting on, managing and remediating\u00a0cyber vulnerabilities\u00a0across endpoints, workloads, and systems. Typically, a security team will leverage a vulnerability management tool to detect vulnerabilities and utilize different processes to patch or remediate them. A strong vulnerability management program uses threat intelligence and knowledge of IT and business operations to prioritize risks and address vulnerabilities as quickly as possible.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-3.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-3.png\" alt=\"\" class=\"wp-image-471\" width=\"390\" height=\"314\" srcset=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-3.png 901w, https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-3-300x242.png 300w, https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-3-768x620.png 768w, https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-content\/uploads\/sites\/26136\/2022\/12\/image-3-600x484.png 600w\" sizes=\"(max-width: 390px) 100vw, 390px\" \/><\/a><\/figure>\n\n\n\n<ul><li>Security Controls Assessor<\/li><li>Software Development and Lifecycle<\/li><li>Cloud Security<\/li><li>DISA ACAS<\/li><li>eMASS<\/li><li>POA&amp;M<\/li><li>STIGS\/SRG\/SCAPS<\/li><li>LEAN SIGMA YELLOW BELT<\/li><li>AGILE &amp; SCRUM METHODOLOGY<\/li><li>GRC<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Risk Management Framework (RMF) The framework allows for any industry with security concerns for their information systems and data to implement a secured environment through the steps in the framework to prevent their valuable assets from unauthorized persons. Vulnerability Management&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/justice-gideon\/skills-and-competencies-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":19632,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-nosidebar.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-json\/wp\/v2\/pages\/430"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-json\/wp\/v2\/users\/19632"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-json\/wp\/v2\/comments?post=430"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-json\/wp\/v2\/pages\/430\/revisions"}],"predecessor-version":[{"id":472,"href":"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-json\/wp\/v2\/pages\/430\/revisions\/472"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/justice-gideon\/wp-json\/wp\/v2\/media?parent=430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}