Analysis Skills, Authentication, Automation, Best Practices, C Programming Language, C++ Programming Language, CISSP - Certified Information Systems Security Professional, Certified Insurance Examiner (CIE), Cloud Computing, Code Reviews, Communication Skills, Computer Firmware, Computer Science, Computer Security, Conferences, Cross-Functional, Cryptographic Protocols, Cyber-Physical, Documentation, Embedded Hardware, Embedded Software, Embedded Systems, Emerging Technology, Energy & Utilities, Energy Management, Engineering, Forensic Science, Fuzz Testing, GIAC - Global Information Assurance Certification, GPEN - GIAC Penetration Tester, Hardware Architecture, IEEE (Institute of Electrical and Electronic Engineers), ISA Standards, Identity Data Management, Incident Response, Industry Standards, Information Technology & Information Systems, International Electro-Technical Commission (IEC), Internet Security, Lean Six Sigma, Linux Operating System, Maintain Compliance, Microsoft Windows Operating System, Network Security, Patents, Penetration Testing, Policy Implementation, Product Lifecycle, Product Management, Product Programs, Product Support, Public Key Infrastructure (PKI), Publications, Python Programming/Scripting Language, Quality Management, Realtime Operating System, Research & Development (R&D), Risk Analysis, Secure Coding, Security Analysis, Security Architecture, Security Design, Security Monitoring, Security Protocols, Software Administration, Software Development, Software Development Lifecycle (SDLC), Standards Organizations, Strategic Planning, Technical Leadership, Technical Publications, Technical Strategy, Technical Support, Technical Writing, Thought Leadership, Threat Modeling, White Papers, Willing to Travel