knowledge of common attack vectors, vulnerabilities, and threat landscapes; Strong understanding of networking protocols, architectures,...