Portfolio

  • Conducting penetration testing on a company's systems to identify vulnerabilities and provide recommendations for remediation.

  • Conducting a review of a company's security architecture to identify potential security gaps and recommend improvements to the system.

  • Analyzing current and emerging threats to a company's systems and providing recommendations for how to mitigate those threats.

  • Developing an incident response plan for Alpha company to help them quickly and effectively respond to cyber security incidents.

  • Conducted security assessments of cloud computing environments to identify potential risks and provide recommendations for improving security.

  • Conducting reviews of company compliance with industry regulations and standards, such as NIST, SOX, HIPPA, PCI, DSS, and GDPR.

  • Developing and implementing network segmentation and access control policies to limit the risk of a cyber attack spreading across a company's network.

  • Designing and implementing a SOC to monitor and respond to cyber security threats in real-time.

  • Conducted a comprehensive security audits and assessments to identify gaps and vulnerabilities in a company's security posture.Item description

Partnerships

Arizona Cyber Warfare Range
Air Force Research Lab
National Council of Teacher Quality
Defense Innovation Unit - Department of Defense
Great Minds
Amazon Web Services