1. Network/system penetrations, scans, security audits, security reviews, security assessments, security evaluations, etc. 2. Researching, architecting, presenting, planning, implementing, configuring, testing and operating secure networks. 3. ...