Findings and analysis shall be presented via PowerPoint presentations, Word documents, and oral presentations as Technical Discovery Reports or Records of Meetings Minutes. Also, the candidate shall support MARFORCYBER, in the identification, analysis, and mitigation of threats to internal Information Technology (IT) systems or networks. The candidate shall support MARFORCYBER, in the following specific Protect and Defend Network tasks: Computer Network Defense (CND) Analysis, Incident Response…
Words 349 - Pages 2