{"id":149,"date":"2021-09-05T19:43:12","date_gmt":"2021-09-05T19:43:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=149"},"modified":"2024-08-03T01:33:53","modified_gmt":"2024-08-03T01:33:53","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/munteansoul\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"<p><strong>Essential Work Habits<\/strong><\/p>\n<ul>\n<li><span style=\"font-weight: 400\">Ability to work methodically and is very detail oriented<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Eagerness to dig into technical questions and examine them from all sides<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Enthusiastic and highly adaptable<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strong analytical and diagnostic skills<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Demonstrated skills in innovation and collaboration<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Keep a current understanding of vulnerabilities from the Internet<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ability to get the job done<\/span><\/li>\n<li>Results Focused<\/li>\n<\/ul>\n<p><strong>Soft Skills<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Excellent presentation and communications skills to effectively communicate with management and customers<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ability to clearly articulate complex concepts both written and verbally<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ability, understanding, and usage of active listening skills especially with customers<\/span><\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"2u64g-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"2u64g-0-0\"><span data-offset-key=\"2u64g-0-0\"><span data-text=\"true\">Customer service<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"3sh6r-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"3sh6r-0-0\"><span data-offset-key=\"3sh6r-0-0\"><span data-text=\"true\">Reports and documents<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"iqmc-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"iqmc-0-0\"><span data-offset-key=\"iqmc-0-0\"><span data-text=\"true\">Outgoing and enthusiastic<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"aoqjr-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"aoqjr-0-0\"><span data-offset-key=\"aoqjr-0-0\"><span data-text=\"true\">Business Strategy<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"7m0op-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"7m0op-0-0\"><span data-offset-key=\"7m0op-0-0\"><span data-text=\"true\">Creative problem solving<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"6dht9-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"6dht9-0-0\"><span data-offset-key=\"6dht9-0-0\"><span data-text=\"true\">Adaptability<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"39hsu-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"39hsu-0-0\"><span data-offset-key=\"39hsu-0-0\"><span data-text=\"true\">Security monitoring<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"3uft2-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"3uft2-0-0\"><span data-offset-key=\"3uft2-0-0\"><span data-text=\"true\">Computer proficiency<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"ad4of-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"ad4of-0-0\"><span data-offset-key=\"ad4of-0-0\"><span data-text=\"true\">Physical Strength<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"5v8al-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"5v8al-0-0\"><span data-offset-key=\"5v8al-0-0\"><span data-text=\"true\">Leadership<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"e4ago-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"e4ago-0-0\"><span data-offset-key=\"e4ago-0-0\"><span data-text=\"true\">Critical thinking<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"3digb-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"3digb-0-0\"><span data-offset-key=\"3digb-0-0\"><span data-text=\"true\">Multitasking<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"76j29-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"76j29-0-0\"><span data-offset-key=\"76j29-0-0\"><span data-text=\"true\">Troubleshooting<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"79a30-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"79a30-0-0\"><span data-offset-key=\"79a30-0-0\"><span data-text=\"true\">Safety awareness<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"5pfv6-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"5pfv6-0-0\"><span data-offset-key=\"5pfv6-0-0\"><span data-text=\"true\">Installing equipment<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"6tbgg-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"6tbgg-0-0\"><span data-offset-key=\"6tbgg-0-0\"><span data-text=\"true\">Data management<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"aaoj9-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"aaoj9-0-0\"><span data-offset-key=\"aaoj9-0-0\"><span data-text=\"true\">PPE<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"5johp-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"5johp-0-0\"><span data-offset-key=\"5johp-0-0\"><span data-text=\"true\">System upgrades<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"15ou-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"15ou-0-0\"><span data-offset-key=\"15ou-0-0\"><span data-text=\"true\">Microsoft Office<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"cj0jp-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"cj0jp-0-0\"><span data-offset-key=\"cj0jp-0-0\"><span data-text=\"true\">Team building<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"2vn1b-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"2vn1b-0-0\"><span data-offset-key=\"2vn1b-0-0\"><span data-text=\"true\">Systems maintenance and upkeep<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"9n9ac-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"9n9ac-0-0\"><span data-offset-key=\"9n9ac-0-0\"><span data-text=\"true\">Safety procedures<\/span><\/span><\/div>\n<\/li>\n<\/ul>\n<p><strong>Solid Technical Foundation<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Understand architecture, administration, and management of operating systems, networking, and virtualization software<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">General programming\/software development concepts and software analytical skills<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Proficiency in programming in Java, C\/C++, disassemblers, and assembly language and \u00a0programming knowledge of two or more scripting languages (PHP, Python, Perl, or shell)<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Understanding of how the different type of firewalls and network load balancers work<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Deep understanding of how network routers and switches work<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Evaluate and design systems and network architectures\u00a0<\/span><\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-reset public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"8tdd3-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"8tdd3-0-0\"><span data-offset-key=\"8tdd3-0-0\"><span data-text=\"true\">Computer literate<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"39hsu-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"39hsu-0-0\"><span data-offset-key=\"39hsu-0-0\"><span data-text=\"true\">Security monitoring<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"e4ago-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"e4ago-0-0\"><span data-offset-key=\"e4ago-0-0\"><span data-text=\"true\">Critical thinking<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"3digb-0-0\"><span data-offset-key=\"5pfv6-0-0\"><span data-text=\"true\">Installing equipment<\/span><\/span><\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"6tbgg-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"6tbgg-0-0\"><span data-offset-key=\"6tbgg-0-0\"><span data-text=\"true\">Data management<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"dd5qe-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"dd5qe-0-0\"><span data-offset-key=\"dd5qe-0-0\"><span data-text=\"true\">Maintenance &amp; Repair<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"bl16l-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"bl16l-0-0\"><span data-offset-key=\"bl16l-0-0\"><span data-text=\"true\">Diagnostics Systems<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"9i0kd-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"9i0kd-0-0\"><span data-offset-key=\"9i0kd-0-0\"><span data-text=\"true\">Motor repairs<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"123ek-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"123ek-0-0\"><span data-offset-key=\"123ek-0-0\"><span data-text=\"true\">Drawing and schematic interpretation<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"5johp-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"5johp-0-0\"><span data-offset-key=\"5johp-0-0\"><span data-text=\"true\">System upgrades<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"2vn1b-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"2vn1b-0-0\"><span data-offset-key=\"2vn1b-0-0\"><span data-text=\"true\">Systems maintenance\u00a0<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"989mq-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"989mq-0-0\"><span data-offset-key=\"989mq-0-0\"><span data-text=\"true\">Generator maintenance<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"dlban-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"dlban-0-0\"><span data-offset-key=\"dlban-0-0\"><span data-text=\"true\">Mechanical analysis and troubleshooting<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"8fls7-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"8fls7-0-0\"><span data-offset-key=\"8fls7-0-0\"><span data-text=\"true\">Vehicle inspections<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"9skc-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"9skc-0-0\"><span data-offset-key=\"9skc-0-0\"><span data-text=\"true\">OSHA Safety Certified<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"di2d8-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"di2d8-0-0\"><span data-offset-key=\"di2d8-0-0\"><span data-text=\"true\">Computer programming<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"ar9us-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"ar9us-0-0\"><span data-offset-key=\"ar9us-0-0\"><span data-text=\"true\">Kali Linux<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"as32b-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"as32b-0-0\"><span data-offset-key=\"as32b-0-0\"><span data-text=\"true\">Ethical hacking with Kali Linux<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"46tv6-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"46tv6-0-0\"><span data-offset-key=\"46tv6-0-0\"><span data-text=\"true\">Python<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"anrhk-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"anrhk-0-0\"><span data-offset-key=\"anrhk-0-0\"><span data-text=\"true\">Harden network and server infrastructure<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"5q4r5-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"5q4r5-0-0\"><span data-offset-key=\"5q4r5-0-0\"><span data-text=\"true\">Encryption<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"11pu9-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"11pu9-0-0\"><span data-offset-key=\"11pu9-0-0\"><span data-text=\"true\">Monitoring computer viruses<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"fec25-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"fec25-0-0\"><span data-offset-key=\"fec25-0-0\"><span data-text=\"true\">Managing security breaches<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"c2c60-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"c2c60-0-0\"><span data-offset-key=\"c2c60-0-0\"><span data-text=\"true\">Protecting networks<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"3ibnk-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"3ibnk-0-0\"><span data-offset-key=\"3ibnk-0-0\"><span data-text=\"true\">Telecommunications systems<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"5a3gn-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"5a3gn-0-0\"><span data-offset-key=\"5a3gn-0-0\"><span data-text=\"true\">Digital forensics<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"1pori-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"1pori-0-0\"><span data-offset-key=\"1pori-0-0\"><span data-text=\"true\">cloud computing environments<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"d2705-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"d2705-0-0\"><span data-offset-key=\"d2705-0-0\"><span data-text=\"true\">steganography and cryptography<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"8nunk-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"8nunk-0-0\"><span data-offset-key=\"8nunk-0-0\"><span data-text=\"true\">authenticate pertinent digital evidence using forensic tools<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"1q5eo-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"1q5eo-0-0\"><span data-offset-key=\"1q5eo-0-0\"><span data-text=\"true\">criminal Justice and criminal Law<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"3toh1-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"3toh1-0-0\"><span data-offset-key=\"3toh1-0-0\"><span data-text=\"true\">public and private security systems in organizations and agencies, both public and private sectors<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"7aoj4-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"7aoj4-0-0\"><span data-offset-key=\"7aoj4-0-0\"><span data-text=\"true\">information technology<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"4h45e-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"4h45e-0-0\"><span data-offset-key=\"4h45e-0-0\"><span data-text=\"true\">database analysis<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"aakkj-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"aakkj-0-0\"><span data-offset-key=\"aakkj-0-0\"><span data-text=\"true\">design and implementation<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"6hq9f-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"6hq9f-0-0\"><span data-offset-key=\"6hq9f-0-0\"><span data-text=\"true\">database administration duties<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"1is93-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"1is93-0-0\"><span data-offset-key=\"1is93-0-0\"><span data-text=\"true\">Advanced SQL statements<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"9uogn-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"9uogn-0-0\"><span data-offset-key=\"9uogn-0-0\"><span data-text=\"true\">database security<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"6c31p-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"6c31p-0-0\"><span data-offset-key=\"6c31p-0-0\"><span data-text=\"true\">Data Recon<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"cfqmk-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"cfqmk-0-0\"><span data-offset-key=\"cfqmk-0-0\"><span data-text=\"true\">Red Hat Blue Hat Fundamentals<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"839jg-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"839jg-0-0\"><span data-offset-key=\"839jg-0-0\"><span data-text=\"true\">Accounting<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"56umc-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"56umc-0-0\"><span data-offset-key=\"56umc-0-0\"><span data-text=\"true\">Financial management<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"887ie-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"887ie-0-0\"><span data-offset-key=\"887ie-0-0\"><span data-text=\"true\">customer service<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"75bvl-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"75bvl-0-0\"><span data-offset-key=\"75bvl-0-0\"><span data-text=\"true\">commercial driver<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"4im6h-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"4im6h-0-0\"><span data-offset-key=\"4im6h-0-0\"><span data-text=\"true\">Telecommunications<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"c7mm5-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"c7mm5-0-0\"><span data-offset-key=\"c7mm5-0-0\"><span data-text=\"true\">Transportation\/Logistics<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"3uf5q-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"3uf5q-0-0\"><span data-offset-key=\"3uf5q-0-0\"><span data-text=\"true\">Detail-oriented<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"d5sqk-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"d5sqk-0-0\"><span data-offset-key=\"d5sqk-0-0\"><span data-text=\"true\">Management<\/span><\/span><\/div>\n<\/li>\n<li class=\"public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR\" data-block=\"true\" data-editor=\"8v7d\" data-offset-key=\"c8akq-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"c8akq-0-0\"><span data-offset-key=\"c8akq-0-0\"><span data-text=\"true\">Leadership<\/span><\/span><\/div>\n<\/li>\n<\/ul>\n<p><strong>Detailed Knowledge of Key Technologies<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Open Source Applications<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Linux Operating Systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Microsoft Technologies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Wireless Technologies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Database Modeling<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Web Application Technologies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Compiled and Interpreted Development Languages<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Network Implementation (Operational and Security)<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Telephony Technologies (Analog and IP)<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Social Engineering<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Physical Security<\/span><\/li>\n<li>Computer language (binary code, Java, Python, Kali Linux, C++)<\/li>\n<li>Automotive Mechanics (all vehicle types)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits Ability to work methodically and is very detail oriented Eagerness to dig into technical questions and examine them from all sides Enthusiastic and highly adaptable Strong analytical and diagnostic skills Demonstrated skills in innovation and collaboration Keep a current understanding of vulnerabilities from the Internet Maintaining awareness and knowledge of contemporary standards,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/munteansoul\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":21339,"featured_media":82,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","wds_primary_avhec_catgroup":0},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/pages\/149"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/users\/21339"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/pages\/149\/revisions"}],"predecessor-version":[{"id":551,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/pages\/149\/revisions\/551"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/media\/82"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/munteansoul\/wp-json\/wp\/v2\/media?parent=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}