Real-Time Network Traffic Monitoring
Security Operations Architecture Design
Cyber Security
Incident Response Process Design & Implementation
Security Posture Determination
Network Security
Information Security
Support Enterprise GRC Objectives
Software
Complex Security Controls Integration
Information Technology