Background or demonstrated experience in information security. Demonstrated experience with attacker tactics, techniques, tools, and procedures (TTP’s). Extensive experience with Python and/or Unix shell scripting. Deep understanding of TCP/IP networking...