Cloud Computing
Cyber Security
Penetration testing
Risk based transaction monitoring
Information Technology
Consulting
Anti-Phishing
Audit Log settings
Application Security Life Cycle (ASLC)
Digital Forensic Investigation
Vendor Risk Management
Vulnerability assessment and Penetration Test and Red Team Exercises
Network Management and Security Secure Configuration
Cloud and Data center Services
Threat Mitigation and Remediation Stratergy
Cloud based log search
Data Leak prevention strategy