SOFTWARE DEVELOPMENT
• Agile Methodologies
• Secure Software Development
• Dynamic Application Security Testing
• Application Modernization
• Secure Software Development
• Dynamic Application Security Testing
• Application Modernization
• Requirements & User Stories
• UX & UI Design
• Database Architecture
• Continuous Integration / Continuous Deployment
• UX & UI Design
• Database Architecture
• Continuous Integration / Continuous Deployment
CYBERSECURITY
• Defensive Cyber Operations
• Computer Network Defense
• RMF Assessments
• Controls Validation Testing
• Vulnerability Analysis
• Computer Network Defense
• RMF Assessments
• Controls Validation Testing
• Vulnerability Analysis
• Software Assurance
• Threat Hunting
• Cyber Key Terrain
• Cyber Situational Understanding
• Risk to Mission Assessments
• Threat Hunting
• Cyber Key Terrain
• Cyber Situational Understanding
• Risk to Mission Assessments
ADVANCED ANALYTICS
• Artificial Intelligence
• Machine Learning
• Data Science
• Data Engineering
• Data Visualization
• Machine Learning
• Data Science
• Data Engineering
• Data Visualization
• Data Modeling
• Data Ingestion
• ETL Processes & Pipelines
• Data Lakes & Warehouses
• Data Ingestion
• ETL Processes & Pipelines
• Data Lakes & Warehouses
INFORMATION TECHNOLOGY
• Systems Administration
• Network Engineering
• Data Center Management
• SharePoint Administration
• Network Engineering
• Data Center Management
• SharePoint Administration
• IT Service Management
• Computer Imaging & Maintenance
• Help Desk / User Support
• Change & Configuration Management
• Computer Imaging & Maintenance
• Help Desk / User Support
• Change & Configuration Management
INTELLIGENCE ANALYSIS
• Supply Chain Risk Management
• All Source Intelligence
• Threat Analysis
• Risk Assessments
• All Source Intelligence
• Threat Analysis
• Risk Assessments
• Counterintelligence
• Finished Intelligence Products
• Counterterrorism
• Finished Intelligence Products
• Counterterrorism