Personal Information
Organization / Workplace
Washington D.C. Metro Area United States
Occupation
Independent Cyber Security and Risk Consultant / Security Architect / ISSO, C|CISO CISSP CRISC CSM CPT ITIL PMP(pending)
About
I provide Cyber Security and Risk Management expertise in the following areas:
* Identity and Access Management (IAM)
* Application Development Security
* Business Continuity and Disaster Recovery Planning
* Cryptography and Encryption
* Information Security Governance, Risk and Compliance (GRC)
* Legal, Regulations and Compliance
* Operations Security
* CLOUD Security/FEDRAMP
* Security Architecture and Design
* Telecommunications and Network Security
* Change and Configuration Management
* Security and Privacy Controls Assessment
* Patch Management
I also provide risk assessments, threat analyses, system/vulnerability scanning and assessments, system tests and evaluations...
Likes
(11)Hacker's Practice Ground - CarolinaCon - 2015
lokeshpidawekar
•
8 years ago
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
lokeshpidawekar
•
8 years ago
Owasp zap
ColdFusionConference
•
9 years ago
My pwk & oscp journey
M.Syarifudin, ST, OSCP, OSWP
•
8 years ago
Recruiters' guide to hire an Ethical hacker
Ayman Hussein
•
8 years ago
Penetration testing web application web application (in) security
Nahidul Kibria
•
9 years ago
Linux server penetration testing project
Emad Soltani
•
8 years ago
Networking and penetration testing
Mohit Belwal
•
9 years ago
CyberLab CCEH Session - 19 Penetration Testing
CyberLab
•
8 years ago
Penetration testing
Ammar WK
•
12 years ago
A Beginners Guide to noSQL
Mike Crabb
•
8 years ago
Personal Information
Organization / Workplace
Washington D.C. Metro Area United States
Occupation
Independent Cyber Security and Risk Consultant / Security Architect / ISSO, C|CISO CISSP CRISC CSM CPT ITIL PMP(pending)
About
I provide Cyber Security and Risk Management expertise in the following areas:
* Identity and Access Management (IAM)
* Application Development Security
* Business Continuity and Disaster Recovery Planning
* Cryptography and Encryption
* Information Security Governance, Risk and Compliance (GRC)
* Legal, Regulations and Compliance
* Operations Security
* CLOUD Security/FEDRAMP
* Security Architecture and Design
* Telecommunications and Network Security
* Change and Configuration Management
* Security and Privacy Controls Assessment
* Patch Management
I also provide risk assessments, threat analyses, system/vulnerability scanning and assessments, system tests and evaluations...