Across
- 4. and Operate, Specialized denial and deception operations
- 5. and Development, provide leadership, management, direction, an/or development
- 6. Provision, Conceptualize, design, and build secure IT systems
Down
- 1. and Defend, Identification, analysis and mitigation of threats
- 2. Examine cyber events and/or crimes of IT systems
- 3. Review and evaluate incoming cybersecurity information
- 5. and maintain, Provide support, administration and maintenance