Personal Information
Entreprise/Lieu de travail
Jacksonville, Florida Area United States
Profession
Security Architect at Enterprise Integration
Secteur d’activité
Technology / Software / Internet
À propos
I am passionate about learning, reading, testing, teaching, sharing, collaborating, and working with great people on interesting projects, and a relentless devotion to the question “What happens if I….”
I am the lead security assessor with experience in penetration testing, web application security, vulnerability management, and compliance assessments. As a balance to my offensive security skills, I am a security architect and manager of our security operations practice, providing tailored security solutions and services to make our customers safer and more effective.
I am a huge proponent of sharing and collaboration, of building your our own tools whenever possible, and taking a
Mots-clés
infosec
security testing
security program
breaches
how to secure
backups
password cracking
password hashes
oclhashcat
phishing
nmap
vulnerability management
powershell
threat intel
siem
big data
security
Tout plus
Présentations
(5)Personal Information
Entreprise/Lieu de travail
Jacksonville, Florida Area United States
Profession
Security Architect at Enterprise Integration
Secteur d’activité
Technology / Software / Internet
À propos
I am passionate about learning, reading, testing, teaching, sharing, collaborating, and working with great people on interesting projects, and a relentless devotion to the question “What happens if I….”
I am the lead security assessor with experience in penetration testing, web application security, vulnerability management, and compliance assessments. As a balance to my offensive security skills, I am a security architect and manager of our security operations practice, providing tailored security solutions and services to make our customers safer and more effective.
I am a huge proponent of sharing and collaboration, of building your our own tools whenever possible, and taking a
Mots-clés
infosec
security testing
security program
breaches
how to secure
backups
password cracking
password hashes
oclhashcat
phishing
nmap
vulnerability management
powershell
threat intel
siem
big data
security
Tout plus