Seasoned and Certified Cybersecurity Professional. Built and managed security operations centers and vulnerability management programs for large corporations
CIS Critical Security Controls are a prescriptive, prioritized set of cybersecurity best practices and defensive actions that can help prevent the most pervasive and dangerous attacks, and support com...
Managing Security Operations entails the design, build, operation and ongoing growth of all facets of the security capability of the organization. An effective SOC has many moving parts and must be de...
Deception technology is a cybersecurity defense practice that aims to deceive attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets. If...
Vulnerability management is the process of identifying, evaluating, treating and reporting on security vulnerabilities in systems and the software that runs on them. This implemented with other securi...