{"id":218,"date":"2026-02-20T15:56:27","date_gmt":"2026-02-20T15:56:27","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2026-04-17T21:27:28","modified_gmt":"2026-04-17T21:27:28","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/seanshreve\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p>I am a non-traditional student pursuing a Bachelor of Science in Cybersecurity, with prior service in the United States Navy as a Cryptologic Technician Maintainer. My experience maintaining and troubleshooting sensitive systems, combined with my academic training, has shaped my understanding of cybersecurity in operational and technical environments. This section highlights three core skill areas, Threat Analysis, Systems Maintenance, and Technical Communications. They all reflect both my background and continued professional development. I plan to return to military service as a Cryptologic Warfare Officer, applying these skills to support secure systems and mission readiness.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Explore My Core Skill Areas:<\/h2>\n\n\n\n<p><strong>\u2192 <a href=\"https:\/\/sites.wp.odu.edu\/seanshreve\/threat-analysis-security-evalutation\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/seanshreve\/threat-analysis-security-evalutation\/\">Threat Analysis and Security Evaluation<\/a><\/strong><br><strong>\u2192 <a href=\"https:\/\/sites.wp.odu.edu\/seanshreve\/systems-maintenance-technical-troubleshooting\/\">Systems Maintenance and Technical Troubleshooting<\/a><\/strong><br><strong>\u2192 <a href=\"https:\/\/sites.wp.odu.edu\/seanshreve\/technical-communication-systems-documentation\/\">Technical Communication and Documentation<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am a non-traditional student pursuing a Bachelor of Science in Cybersecurity, with prior service in the United States Navy as a Cryptologic Technician Maintainer. My experience maintaining and troubleshooting sensitive systems, combined with my academic training, has shaped my understanding of cybersecurity in operational and technical environments. This section highlights three core skill areas,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/seanshreve\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":32185,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/users\/32185"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":376,"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/pages\/218\/revisions\/376"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}