1 |
Has sufficient knowledge of mathematics in the field of information security and the ability to use theoretical and applied knowledge in this field in solving complex data science problems. |
2 |
Can analyze and interpret the information obtained with the ability to conduct scientific research in depth. |
3 |
Competence in the design and implementation of analytical, modeling and experimental research; has the ability to analyze and interpret complex cyber attacks |
4 |
By working with vulnerable systems, it can close vulnerabilities and integrate information from different sources. |
5 |
Has the necessary programming skills to identify and solve information security problems |
6 |
Has the ability to lead multidisciplinary teams, develop solution strategies for complex problems, take responsibility and contribute to team work. |
7 |
Ability to develop innovative ideas and methods; Has the ability to introduce new approaches in vulnerability detection and defense processes in the field of information security |
8 |
Competent in defining, accessing and evaluating the required data and information, data management and analytics. |
9 |
Can follow current developments in the field of information security, learn and adapt new technologies quickly |
10 |
Can effectively convey the results of work done and present technical and complex topics in an understandable way |
11 |
Is aware of the social and environmental impacts of information security practices and can adapt in this context |
12 |
Has knowledge of social, scientific and ethical values in attack detection, prevention and reporting processes; Observes ethical principles and prioritizes the benefit of society |