Network protocols, TCP/IP, DNS, firewalls, encryption (AES, RSA, PKI), vulnerability scanning, penetration testing, endpoint protection with Trend Micro, Cisco AMP, CrowdStrike, Microsoft Defender, incident response, malware analysis, phishing defense, Microsoft Azure, cloud security, identity and access management (IAM), SIEM tools like Microsoft Sentinel and Google Chronicle, log analysis, incident response automation, Azure DevOps, cloud infrastructure security, macOS, iOS, Windows Server, Linux (Ubuntu), system hardening, mobile device management (MDM) with Jamf, Jamf Protect, endpoint detection and response (EDR) with CrowdStrike, configuration management, forensic analysis with Cellebrite Inspector, MacQuisition, IT service management (ITSM) with ServiceNow, Agile methodology, Scrum framework, project planning, risk management, resource management, workflow automation using Jira, Azure DevOps, CI/CD pipelines, PowerShell scripting, security orchestration, process automation, infrastructure as code (IaC), DevOps best practices, Google Chronicle, Microsoft Sentinel, LogRhythm, Splunk Enterprise, security orchestration and automation (SOAR) with Palo Alto XSOAR, playbook development, automated incident response workflows, Vulnerability management with Qualys, Tenable, threat detection, root cause analysis, incident response playbooks, DDoS defense, digital forensics, encryption technologies (AES, RSA), System troubleshooting, hardware maintenance, endpoint management, encryption protocols, IT infrastructure management, firewall administration