Skills:
Linux, Windows, etc., Subnetting,Well-known networking protocols, XSS attacks , SQL Injection, Hashing,Exploits, vulnerabilities, network attacks , Encryption,Packet analysis tools (tcpdump, wireshark), Buffer Overflow attacks, Exploit Kits ,Regular expressions,Database structures and queries , True Positives, False Positives,Vulnerability Scans , True Negatives,Port Scans, False Negatives,User-Agents ,Trojans (RATs, Downloaders,Ransomware, etc.),Worms ,Dell SecureWorks SIEM offering, Text Editors: VI and Notepad++,Dell SecureWorks iSensor, tcpflow,ISS IBM Site Protector, rwfilter/rwcut,Snort, Putty,iptables, SuperPutty,python, Virtuawin,Virtual Box (ISOs: Mint, Ubuntu, Kali, Web Security Dojo, etc.), grep, awk, md5sum, cut, uniq, sort, Web Tools (IP/DNS Reputation sites,encoder/decoder sites)