Experience in understanding attacks and mitigation methods, in two or more of the following: network protocols and secure network design, web application security, security assessments and pen testing, authentication and access control, applied cryptography and security protocols, security monitoring and intrusion detection, incident response and forensics, development of security tools, automation or frameworks.