
Managing the security of an organization’s IT environment in a day-to-day work environment

Analysis of the IT environment, its configuration, and the security solutions used

Effective detection of cyber-attacks among the normal network activity of the organization’s employees and external users

Quick response to unusual user behavior

Managing the security of an organization’s IT environment in a day-to-day work environment

Responding to incidents and protecting critical systems of the organization

Carrying out cyber-attacks in a real, isolated environment with the participation of the adversary

Teamwork, assignment of responsibilities and tasks

Operating under time pressure

Analysis of the IT environment, its configuration, and the security solutions used

Developing scenarios for cyber-attacks

Knowledge of techniques, tools, and procedures used in offensive operations

Creation and use of software to verify system vulnerability