Cybersecurity Practitioner Portfolio Certifications Vulnerability Management Vulnerability Management Program Implementation Automated STIG Compliance Scripts Threat Hunting & Security Operations Scenario-Based Threat Hunting Network Traffic Analysis & Detection Wireshark Malware Traffic Analysis Wireshark PCAP Analysis SIEM, Logging & Incident Analysis Splunk Enterprise Monitoring Splunk BOTS Write-Ups ELK Stack Threat Detection Tools Operating Systems & Platforms SIEM & Security Monitoring Log Collection & Telemetry Network Security & Traffic Analysis Threat Detection & Intelligence Malware Analysis & DFIR Automation & Networking