Consults on IT and cyber defensive architecture and technologies Assesses assigned Cyber domain to thoroughly understand the mission, architecture and threat Advises on technical design and implementation of Defensive Cyber Operations capability required to effectively protect, detect and respond to cyber threats and attack Research cyber defense technology options for best fit based on mission, architecture and threat Design, implement, configure and/or tune Cyber Defense technology Authors documentations to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. Elastic Search, Logstash, Kibana, Splunk, etc.) -Agile frameworks for software development -Linux operating systems (Red Hat, Kali, etc.) -Windows operating systems -Network infrastructure -Security applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.) Bachelor's degree in a cyber-related discipline (e.g.