Upgrade hardware and software components as required
Solve complex problems with many variables and solution
Social engineering given that humans are the weakest link in the security chain, an analyst's expertise can help with awareness training
Forensics investigation and analysis of how and why a breach or other compromise occurred
Troubleshooting the skill to recognize the cause of a problem
TCP/IP, computer networking, routing and switching an understanding of the fundamentals: the language, protocol and functioning of the internet
ISO27001 assessment specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization's risk management
Cloud computing the risks and benefits of using a vendor's remote servers to store, manage and process an organization's data