Job DescriptionJob DescriptionCompany Description Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide. Job Description Overview SOSi is seeking a Senior Threat Hunter to support proactive cyber defense activities in alignment with our customer. This role is responsible for conducting threat hunting operations, analyzing data from multiple sources to identify malicious activity, supporting detection and response efforts, and applying advanced analytical techniques to improve cyber defense operations. Responsibilities Conduct proactive threat hunting to identify malicious activity, indicators of compromise, and anomalous behavior across the enterprise Analyze data from logs, sensors, endpoint detection and response (EDR) tools, and full packet capture (PCAP) sources to detect threats Apply threat hunting methodologies using MITRE ATT&CK and MITRE D3FEND frameworks Support detection, analysis, and response to cyber threats in coordination with SOC and incident response teams Perform analysis of TCP/IP traffic, intrusion detection system (IDS) data, malware activity, and adversary tactics, techniques, and procedures (TTPs) Use scripting and query tools to support threat analysis, data hunting, and development of analytical outputs Support development of threat hunting products, reporting, and recommendations to improve cyber defense detection and monitoring Qualifications Experience: Five (5) or more years of experience in data hunting, manipulation, and presentation Management or team lead experience Experience with MITRE ATT&CK and MITRE D3FEND Experience analyzing TCP/IP, IDS data, PCAP, logs, and sensor data Experience supporting malware analysis Experience with Endpoint Detection and Response (EDR) tools Experience with scripting or query languages including R, Python, PIG, HIVE, or SQL Education: Bachelor's Degree (Bachelor's Degree may be substituted with additional 4+ years of experience as approved by Government) Certifications: One of: CISSP (Associate) CCSP SSCP GCIH GNFA GCIA Plus one DoD 8570 CSSP certification in: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder Clearance/Suitability: Secret (active), Top Secret, SCI Eligible Additional Information Work Environment Normal office conditions with potential to perform duties in deployed locations. Core hours of operation are Monday through Friday, 0600 - 1700. May be requested to work evenings and weekends to meet program and contract needs. Working at SOSi All interested individuals will receive consideration and will not be discriminated against for any reason.
05/15/2026
Full time
Job DescriptionJob DescriptionCompany Description Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide. Job Description Overview SOSi is seeking a Senior Threat Hunter to support proactive cyber defense activities in alignment with our customer. This role is responsible for conducting threat hunting operations, analyzing data from multiple sources to identify malicious activity, supporting detection and response efforts, and applying advanced analytical techniques to improve cyber defense operations. Responsibilities Conduct proactive threat hunting to identify malicious activity, indicators of compromise, and anomalous behavior across the enterprise Analyze data from logs, sensors, endpoint detection and response (EDR) tools, and full packet capture (PCAP) sources to detect threats Apply threat hunting methodologies using MITRE ATT&CK and MITRE D3FEND frameworks Support detection, analysis, and response to cyber threats in coordination with SOC and incident response teams Perform analysis of TCP/IP traffic, intrusion detection system (IDS) data, malware activity, and adversary tactics, techniques, and procedures (TTPs) Use scripting and query tools to support threat analysis, data hunting, and development of analytical outputs Support development of threat hunting products, reporting, and recommendations to improve cyber defense detection and monitoring Qualifications Experience: Five (5) or more years of experience in data hunting, manipulation, and presentation Management or team lead experience Experience with MITRE ATT&CK and MITRE D3FEND Experience analyzing TCP/IP, IDS data, PCAP, logs, and sensor data Experience supporting malware analysis Experience with Endpoint Detection and Response (EDR) tools Experience with scripting or query languages including R, Python, PIG, HIVE, or SQL Education: Bachelor's Degree (Bachelor's Degree may be substituted with additional 4+ years of experience as approved by Government) Certifications: One of: CISSP (Associate) CCSP SSCP GCIH GNFA GCIA Plus one DoD 8570 CSSP certification in: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder Clearance/Suitability: Secret (active), Top Secret, SCI Eligible Additional Information Work Environment Normal office conditions with potential to perform duties in deployed locations. Core hours of operation are Monday through Friday, 0600 - 1700. May be requested to work evenings and weekends to meet program and contract needs. Working at SOSi All interested individuals will receive consideration and will not be discriminated against for any reason.
Job DescriptionJob DescriptionCompany Description Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide. Job Description Overview SOSi is seeking a Senior Threat Hunter to support proactive cyber defense activities in alignment with our customer. This role is responsible for conducting threat hunting operations, analyzing data from multiple sources to identify malicious activity, supporting detection and response efforts, and applying advanced analytical techniques to improve cyber defense operations. Responsibilities Conduct proactive threat hunting to identify malicious activity, indicators of compromise, and anomalous behavior across the enterprise Analyze data from logs, sensors, endpoint detection and response (EDR) tools, and full packet capture (PCAP) sources to detect threats Apply threat hunting methodologies using MITRE ATT&CK and MITRE D3FEND frameworks Support detection, analysis, and response to cyber threats in coordination with SOC and incident response teams Perform analysis of TCP/IP traffic, intrusion detection system (IDS) data, malware activity, and adversary tactics, techniques, and procedures (TTPs) Use scripting and query tools to support threat analysis, data hunting, and development of analytical outputs Support development of threat hunting products, reporting, and recommendations to improve cyber defense detection and monitoring Qualifications Experience: Five (5) or more years of experience in data hunting, manipulation, and presentation Management or team lead experience Experience with MITRE ATT&CK and MITRE D3FEND Experience analyzing TCP/IP, IDS data, PCAP, logs, and sensor data Experience supporting malware analysis Experience with Endpoint Detection and Response (EDR) tools Experience with scripting or query languages including R, Python, PIG, HIVE, or SQL Education: Bachelor's Degree (Bachelor's Degree may be substituted with additional 4+ years of experience as approved by Government) Certifications: One of: CISSP (Associate) CCSP SSCP GCIH GNFA GCIA Plus one DoD 8570 CSSP certification in: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder Clearance/Suitability: Secret (active), Top Secret, SCI Eligible Additional Information Work Environment Normal office conditions with potential to perform duties in deployed locations. Core hours of operation are Monday through Friday, 0600 - 1700. May be requested to work evenings and weekends to meet program and contract needs. Working at SOSi All interested individuals will receive consideration and will not be discriminated against for any reason.
05/15/2026
Full time
Job DescriptionJob DescriptionCompany Description Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide. Job Description Overview SOSi is seeking a Senior Threat Hunter to support proactive cyber defense activities in alignment with our customer. This role is responsible for conducting threat hunting operations, analyzing data from multiple sources to identify malicious activity, supporting detection and response efforts, and applying advanced analytical techniques to improve cyber defense operations. Responsibilities Conduct proactive threat hunting to identify malicious activity, indicators of compromise, and anomalous behavior across the enterprise Analyze data from logs, sensors, endpoint detection and response (EDR) tools, and full packet capture (PCAP) sources to detect threats Apply threat hunting methodologies using MITRE ATT&CK and MITRE D3FEND frameworks Support detection, analysis, and response to cyber threats in coordination with SOC and incident response teams Perform analysis of TCP/IP traffic, intrusion detection system (IDS) data, malware activity, and adversary tactics, techniques, and procedures (TTPs) Use scripting and query tools to support threat analysis, data hunting, and development of analytical outputs Support development of threat hunting products, reporting, and recommendations to improve cyber defense detection and monitoring Qualifications Experience: Five (5) or more years of experience in data hunting, manipulation, and presentation Management or team lead experience Experience with MITRE ATT&CK and MITRE D3FEND Experience analyzing TCP/IP, IDS data, PCAP, logs, and sensor data Experience supporting malware analysis Experience with Endpoint Detection and Response (EDR) tools Experience with scripting or query languages including R, Python, PIG, HIVE, or SQL Education: Bachelor's Degree (Bachelor's Degree may be substituted with additional 4+ years of experience as approved by Government) Certifications: One of: CISSP (Associate) CCSP SSCP GCIH GNFA GCIA Plus one DoD 8570 CSSP certification in: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder Clearance/Suitability: Secret (active), Top Secret, SCI Eligible Additional Information Work Environment Normal office conditions with potential to perform duties in deployed locations. Core hours of operation are Monday through Friday, 0600 - 1700. May be requested to work evenings and weekends to meet program and contract needs. Working at SOSi All interested individuals will receive consideration and will not be discriminated against for any reason.
Cyber Security Threat Analyst/Specialist - Senior Concord, CA 6 Months LOCAL CANDIDATES ONLY. The role is hybrid 3 days onsite (Tues, Wed, and Thurs) and 2 days wfh Payrate $75 - 100/hr TOP THINGS: - teamwork, curiosity, tenacity WORK SCHEDULE: Monday through Friday (day shift) 6:00 AM to 2:30 PM. Description: Department Overview Responsible for the delivery of information security services including intelligence research, threat assessment, security event monitoring/analysis, vulnerability management and security tool administration in support of clients enterprise security goals and objectives. Cyber Threat Specialists use a variety of commercial and custom tools and processes to provide the information security services mentioned above. Cyber Threat Specialists are experts in the operation of these tools and have the ability to design improvised solutions on the fly when dealing with active threats. Cyber Threat Specialists produce metrics and statistics that feed complimentary processes in client such as risk assessment, patching, anti-virus, firewall management, etc. Cyber Threat Specialists are very technically skilled and have the ability to work successfully with other technical teams within clients IT department and beyond. Position Summary The Monitoring & Response Team (also known as M&R) is the 24x7 security operations team that is essentially clients first line of defense that is continuously preventing, detecting, analyzing, and responding to cybersecurity events to improve the organizations security posture. The Monitoring & Response Team is built with the foundation of a standard SOC but operates differently by utilizing Threat Intelligence in our daily investigations of security events. The Monitoring & Response Team also operates in a proactive/reactive manner to maintain the highest level of efficacy in their tasks. Job Responsibilities Monitors daily cybersecurity activity in shifts through looking at tools to determine if activity is malignant or benign and then engage others as required Provides analysis on malware and escalates as appropriate to incident response Teams Does baseline threat hunting based on intelligence for utility peers and other intelligence sources Provides hunting/analysis on phishing cases and reports of potential compromise/breach Performs proficient forensic analysis using security tools and monitoring systems to Client the source of anomalous security events Assists in performing basic research internally and externally Performs complex system administration tasks (e.g. customization, cross-tool integration) for security tools Develops a strategy to implement work in department Qualifications Minimum: High School or GED-General Educational Development-GED Diploma Desired: Bachelors Degree in Computer Science or job-related discipline or equivalent experience IT-Information Technology Security certification
05/11/2026
Full time
Cyber Security Threat Analyst/Specialist - Senior Concord, CA 6 Months LOCAL CANDIDATES ONLY. The role is hybrid 3 days onsite (Tues, Wed, and Thurs) and 2 days wfh Payrate $75 - 100/hr TOP THINGS: - teamwork, curiosity, tenacity WORK SCHEDULE: Monday through Friday (day shift) 6:00 AM to 2:30 PM. Description: Department Overview Responsible for the delivery of information security services including intelligence research, threat assessment, security event monitoring/analysis, vulnerability management and security tool administration in support of clients enterprise security goals and objectives. Cyber Threat Specialists use a variety of commercial and custom tools and processes to provide the information security services mentioned above. Cyber Threat Specialists are experts in the operation of these tools and have the ability to design improvised solutions on the fly when dealing with active threats. Cyber Threat Specialists produce metrics and statistics that feed complimentary processes in client such as risk assessment, patching, anti-virus, firewall management, etc. Cyber Threat Specialists are very technically skilled and have the ability to work successfully with other technical teams within clients IT department and beyond. Position Summary The Monitoring & Response Team (also known as M&R) is the 24x7 security operations team that is essentially clients first line of defense that is continuously preventing, detecting, analyzing, and responding to cybersecurity events to improve the organizations security posture. The Monitoring & Response Team is built with the foundation of a standard SOC but operates differently by utilizing Threat Intelligence in our daily investigations of security events. The Monitoring & Response Team also operates in a proactive/reactive manner to maintain the highest level of efficacy in their tasks. Job Responsibilities Monitors daily cybersecurity activity in shifts through looking at tools to determine if activity is malignant or benign and then engage others as required Provides analysis on malware and escalates as appropriate to incident response Teams Does baseline threat hunting based on intelligence for utility peers and other intelligence sources Provides hunting/analysis on phishing cases and reports of potential compromise/breach Performs proficient forensic analysis using security tools and monitoring systems to Client the source of anomalous security events Assists in performing basic research internally and externally Performs complex system administration tasks (e.g. customization, cross-tool integration) for security tools Develops a strategy to implement work in department Qualifications Minimum: High School or GED-General Educational Development-GED Diploma Desired: Bachelors Degree in Computer Science or job-related discipline or equivalent experience IT-Information Technology Security certification
Department: Information Technology-SOM - 420401 Career Area : Information Technology Posting Open Date: 01/09/2026 Application Deadline: 01/19/2026 Position Type: Temporary Staff (SHRA) Position Title : Technology Support Technician Position Number: Vacancy ID: S026698 Full-time/Part-time: Full-Time Temporary Hours per week: 40 Position Location: North Carolina, US Hiring Range: $19.00/per hour Estimated Duration of Appointment: 6 months not to exceed 11 months Be a Tar Heel!: A global higher education leader in innovative teaching, research and public service, the University of North Carolina at Chapel Hill consistently ranks as one of the nation's top public universities . Known for its beautiful campus, world-class medical care, commitment to the arts and top athletic programs, Carolina is an ideal place to teach, work and learn.One of the best college towns and best places to live in the United States, Chapel Hill has diverse social, cultural, recreation and professional opportunities that span the campus and community.University employees can choose from a wide range of professional training opportunities for career growth, skill development and lifelong learning and enjoy exclusive perks that include numerous retail and restaurant discounts, savings on local child care centers and special rates for performing arts events. Primary Purpose of Organizational Unit: Our mission is to improve the health and well-being of North Carolinians and others whom we serve. We accomplish this by providing leadership and excellence in the interrelated areas of patient care, education and research. Patient care: We promote health and provide superb clinical care while maintaining our strong tradition of reaching underserved populations and reducing health disparities across North Carolina and beyond. Education: We prepare tomorrow s healthcare professionals and biomedical researchers from all backgrounds by facilitating learning within innovative and integrated curricula and team-oriented interprofessional education to ensure a highly skilled workforce. Research: We develop and support a rich array of outstanding health sciences research programs, centers and resources. We provide infrastructure and opportunities for collaboration among disciplines throughout and beyond our university to support outstanding research. We foster programs in the areas of basic, translational, mechanistic and population research. Position Summary: This position will report to the Hub Lead. Provide service-oriented technical support and/or training to UNC School of Medicine faculty, staff, and students for a variety of hardware, software, operating systems and networks. Principal duties require working knowledge, technical aptitude and analytical skills in diagnosing and resolving customer problems either over the phone, via remote support tools, or in person. Complex troubleshooting will be performed in collaboration with internal and external technical support groups. Escalation to a Technical Support Analyst/Specialist may also be necessary. Duties also include documenting work completed and contributing to technical projects. Provide support to further and achieve the goals and priorities established by the leadership of the School of Medicine. Candidate must have excellent customer service skills and work well in a team environment. Minimum Education and Experience Requirements: Graduation from high school and one year in the field of technology related to the position's role. - Computer coursework may be substituted year-for- year for the required experience; or an equivalent combination of education and experience. - Journey level requires an additional six months experience - Advanced level requires an additional one year of experience. Required Qualifications, Competencies, and Experience: Candidates must have demonstrated troubleshooting skills and be able to solve simple technical problems with ease. Candidates must have excellent communication skills, both written and oral. Candidates must have strong customer service skills and work well in a team environment. Candidates must have demonstrated experience with both Windows and Macintosh environments. Preferred Qualifications, Competencies, and Experience: Prefer candidates with basic troubleshooting for smartphones/tablets, and extensive Virus/Malware removal experience. Campus Security Authority Responsibilities: Not Applicable.
01/14/2026
Full time
Department: Information Technology-SOM - 420401 Career Area : Information Technology Posting Open Date: 01/09/2026 Application Deadline: 01/19/2026 Position Type: Temporary Staff (SHRA) Position Title : Technology Support Technician Position Number: Vacancy ID: S026698 Full-time/Part-time: Full-Time Temporary Hours per week: 40 Position Location: North Carolina, US Hiring Range: $19.00/per hour Estimated Duration of Appointment: 6 months not to exceed 11 months Be a Tar Heel!: A global higher education leader in innovative teaching, research and public service, the University of North Carolina at Chapel Hill consistently ranks as one of the nation's top public universities . Known for its beautiful campus, world-class medical care, commitment to the arts and top athletic programs, Carolina is an ideal place to teach, work and learn.One of the best college towns and best places to live in the United States, Chapel Hill has diverse social, cultural, recreation and professional opportunities that span the campus and community.University employees can choose from a wide range of professional training opportunities for career growth, skill development and lifelong learning and enjoy exclusive perks that include numerous retail and restaurant discounts, savings on local child care centers and special rates for performing arts events. Primary Purpose of Organizational Unit: Our mission is to improve the health and well-being of North Carolinians and others whom we serve. We accomplish this by providing leadership and excellence in the interrelated areas of patient care, education and research. Patient care: We promote health and provide superb clinical care while maintaining our strong tradition of reaching underserved populations and reducing health disparities across North Carolina and beyond. Education: We prepare tomorrow s healthcare professionals and biomedical researchers from all backgrounds by facilitating learning within innovative and integrated curricula and team-oriented interprofessional education to ensure a highly skilled workforce. Research: We develop and support a rich array of outstanding health sciences research programs, centers and resources. We provide infrastructure and opportunities for collaboration among disciplines throughout and beyond our university to support outstanding research. We foster programs in the areas of basic, translational, mechanistic and population research. Position Summary: This position will report to the Hub Lead. Provide service-oriented technical support and/or training to UNC School of Medicine faculty, staff, and students for a variety of hardware, software, operating systems and networks. Principal duties require working knowledge, technical aptitude and analytical skills in diagnosing and resolving customer problems either over the phone, via remote support tools, or in person. Complex troubleshooting will be performed in collaboration with internal and external technical support groups. Escalation to a Technical Support Analyst/Specialist may also be necessary. Duties also include documenting work completed and contributing to technical projects. Provide support to further and achieve the goals and priorities established by the leadership of the School of Medicine. Candidate must have excellent customer service skills and work well in a team environment. Minimum Education and Experience Requirements: Graduation from high school and one year in the field of technology related to the position's role. - Computer coursework may be substituted year-for- year for the required experience; or an equivalent combination of education and experience. - Journey level requires an additional six months experience - Advanced level requires an additional one year of experience. Required Qualifications, Competencies, and Experience: Candidates must have demonstrated troubleshooting skills and be able to solve simple technical problems with ease. Candidates must have excellent communication skills, both written and oral. Candidates must have strong customer service skills and work well in a team environment. Candidates must have demonstrated experience with both Windows and Macintosh environments. Preferred Qualifications, Competencies, and Experience: Prefer candidates with basic troubleshooting for smartphones/tablets, and extensive Virus/Malware removal experience. Campus Security Authority Responsibilities: Not Applicable.
Job Title: Incident Response Lead Specialist Location: Minot, North Dakota Experience: 12+ Years Employment Type: Contract Interview Type: In-Person or Webcam Job Description We are seeking an experienced Incident Response Lead Specialist to oversee the management, coordination, and execution of cybersecurity incident response activities. This role involves guiding technical teams during security incidents, developing response strategies, improving detection capabilities, and maintaining response readiness across the organization. The ideal candidate has deep experience handling complex cyber incidents, working with security tools, conducting forensic analysis, and collaborating with internal and external stakeholders. The Incident Response Lead Specialist will work closely with Security Operations, Threat Intelligence, IT Operations, and executive leadership to minimize risk exposure and ensure rapid and effective response to threats. This position requires excellent communication, analytical, and leadership skills, with the ability to guide response actions under pressure. Key Responsibilities Lead end-to-end incident response activities including triage, containment, eradication, and recovery. Develop, maintain, and improve incident response plans, runbooks, and procedures. Conduct forensic investigations to identify attack vectors, root causes, and potential data exposure. Manage communication with internal teams, leadership, and external partners during and after incidents. Coordinate threat analysis and collaborate with SOC analysts, security engineers, and IT operations. Perform after-action reviews and implement lessons learned to strengthen security posture. Build and maintain incident response readiness, including training and tabletop exercises. Monitor emerging cyber threats, vulnerabilities, and indicators of compromise. Support deployment and tuning of security technologies such as SIEM, EDR, SOAR, and forensics tools. Ensure compliance with regulatory, audit, and reporting requirements. Provide thought leadership and mentor junior cybersecurity staff. Required Skills and Qualifications 12+ years of experience in cybersecurity, incident response, digital forensics, or security operations. Proven leadership experience managing complex cybersecurity incidents. Strong knowledge of security frameworks such as NIST, MITRE ATT&CK, ISO 27001, and CIS Controls. Hands-on experience with SIEM, EDR, threat intelligence platforms, and forensic tools. Strong understanding of network security, operating systems, cloud security, and malware analysis. Ability to produce clear and actionable incident documentation and reports. Strong problem-solving abilities and capability to act decisively during high-pressure situations. Excellent communication and stakeholder management skills. Experience with regulatory environments such as HIPAA, PCI-DSS, SOX, or DoD frameworks. Relevant certifications such as CISSP, CISM, CEH, GCIA, GCFA, GCIH, or CCSP are preferred. Bachelor's degree in Computer Science, Cybersecurity, or related field (or equivalent experience
01/06/2026
Job Title: Incident Response Lead Specialist Location: Minot, North Dakota Experience: 12+ Years Employment Type: Contract Interview Type: In-Person or Webcam Job Description We are seeking an experienced Incident Response Lead Specialist to oversee the management, coordination, and execution of cybersecurity incident response activities. This role involves guiding technical teams during security incidents, developing response strategies, improving detection capabilities, and maintaining response readiness across the organization. The ideal candidate has deep experience handling complex cyber incidents, working with security tools, conducting forensic analysis, and collaborating with internal and external stakeholders. The Incident Response Lead Specialist will work closely with Security Operations, Threat Intelligence, IT Operations, and executive leadership to minimize risk exposure and ensure rapid and effective response to threats. This position requires excellent communication, analytical, and leadership skills, with the ability to guide response actions under pressure. Key Responsibilities Lead end-to-end incident response activities including triage, containment, eradication, and recovery. Develop, maintain, and improve incident response plans, runbooks, and procedures. Conduct forensic investigations to identify attack vectors, root causes, and potential data exposure. Manage communication with internal teams, leadership, and external partners during and after incidents. Coordinate threat analysis and collaborate with SOC analysts, security engineers, and IT operations. Perform after-action reviews and implement lessons learned to strengthen security posture. Build and maintain incident response readiness, including training and tabletop exercises. Monitor emerging cyber threats, vulnerabilities, and indicators of compromise. Support deployment and tuning of security technologies such as SIEM, EDR, SOAR, and forensics tools. Ensure compliance with regulatory, audit, and reporting requirements. Provide thought leadership and mentor junior cybersecurity staff. Required Skills and Qualifications 12+ years of experience in cybersecurity, incident response, digital forensics, or security operations. Proven leadership experience managing complex cybersecurity incidents. Strong knowledge of security frameworks such as NIST, MITRE ATT&CK, ISO 27001, and CIS Controls. Hands-on experience with SIEM, EDR, threat intelligence platforms, and forensic tools. Strong understanding of network security, operating systems, cloud security, and malware analysis. Ability to produce clear and actionable incident documentation and reports. Strong problem-solving abilities and capability to act decisively during high-pressure situations. Excellent communication and stakeholder management skills. Experience with regulatory environments such as HIPAA, PCI-DSS, SOX, or DoD frameworks. Relevant certifications such as CISSP, CISM, CEH, GCIA, GCFA, GCIH, or CCSP are preferred. Bachelor's degree in Computer Science, Cybersecurity, or related field (or equivalent experience