Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies).