, routing protocols), system administration, malware (propagation, infection, types), intermediate knowledge of network security..., Microsoft Active Directory. Deep knowledge of security operations: perimeter defense, forensics, incident response, kill chain...
Sound Transit