Describe your experience and tools used in network security monitoring.
Describe your experience with Security Incident Response, Incident Handling, and Reporting.
Describe your experience and tools used in vulnerability management.
Describe your experience and tools used in cybersecurity Threat Hunting.
Describe your experience and tools used in computer forensics.
Describe your experience in doing risk assessments.