| Skill | Required / Desired | Amount | of Experience |
| Considerable knowledge and hands on experience in the areas of information systems security of security policy | 7 | Years | |
| Considerable knowledge hands on experience with web security gateways, network access control, endpoint security, and perimeter security technologies. | 7 | Years | |
| Considerable knowledge and hands on experience with firewalls, anti-virus software, anti-malware, anti-phishing, authentication systems. | 7 | Years | |
| Considerable knowledge and hands on experience with intrusion detection/prevention systems, log analysis and management, web content filtering | 7 | Years | |
| Considerable knowledge and experience with network protocols and security/authentication protocols at all layers of OSI model with emphasis on TCP/IP | 7 | Years | |
| Demonstrated ability to identify security risks across the enterprise and perform the day-to-day operation. | 7 | Years | |
| Demonstrated ability to administer and protect the integrity, confidentiality, and availability of information assets and technology infrastructure | 7 | Years | |
| Considerable knowledge and hands on experience detecting, responding, remediating security incidents. | 7 | Years | |
| Considerable knowledge and hands on experience remediating System Security Plans (SSP) and Risk Assessment (RA) in cybersecurity | 7 | Years | |
| Solid experience with performing threat; vulnerability, risk assessment and coordinating the resolution of incidents related to security breaches. | 7 | Years | |
| Considerable knowledge and hands on experience with web related technologies and penetration testing tools | 7 | Years | |
| CISSP | Highly desired | Years |