techniques, OSI model, defense-in-depth, Cyber Kill Chain or similar attack model. Security Clearance Statement: This position... cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis using raw packet...