Successfully reported this slideshow.
Your SlideShare is downloading. ×

Jeremy Quadri

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 12 Ad

Jeremy Quadri

Download to read offline

BEng Hons, CISSP. Father. Snowboarder. Motorcyclist. DevOps Engineer. Security Controls/Architect. Vulnerability Assessor. Projects on cybersecurity matters.

Security-Driven IT Consulting and Management Professional | Diverse European Experience
Expertise designing, developing, implementing, and s.upporting information / system security infrastructures.

F5 LTM/ASM, MySQL DBMS, Perl, PHP, Python, JMeter, Webscarab, Microsoft Products, ModSecurity, LDAP, AWK, SED, OpenSSL, AppScan, Burpsuite, HP Webinspect, Nessus, ArcSight, Vordal Secure, Cacti/ Nagios,Netdata Bash, KSH, TCPDump, Wireshark, Metasploit, Splunk/Xpolog, Beeware, Syslog-ng, Opensta, Nmap, Backtrack, ISO/IEC 2700, NIST, OSSTMM, OWASP, BPMN, SonarQube, Kubernetes,Helm, Docker Container, Rancher, Proxmox, PingFederate, Google Cloud, Azure, AWS, Thycotic, PingIdentity, Modsecurity

BEng Hons, CISSP. Father. Snowboarder. Motorcyclist. DevOps Engineer. Security Controls/Architect. Vulnerability Assessor. Projects on cybersecurity matters.

Security-Driven IT Consulting and Management Professional | Diverse European Experience
Expertise designing, developing, implementing, and s.upporting information / system security infrastructures.

F5 LTM/ASM, MySQL DBMS, Perl, PHP, Python, JMeter, Webscarab, Microsoft Products, ModSecurity, LDAP, AWK, SED, OpenSSL, AppScan, Burpsuite, HP Webinspect, Nessus, ArcSight, Vordal Secure, Cacti/ Nagios,Netdata Bash, KSH, TCPDump, Wireshark, Metasploit, Splunk/Xpolog, Beeware, Syslog-ng, Opensta, Nmap, Backtrack, ISO/IEC 2700, NIST, OSSTMM, OWASP, BPMN, SonarQube, Kubernetes,Helm, Docker Container, Rancher, Proxmox, PingFederate, Google Cloud, Azure, AWS, Thycotic, PingIdentity, Modsecurity

Advertisement
Advertisement

More Related Content

Similar to Jeremy Quadri (20)

Recently uploaded (20)

Advertisement

Jeremy Quadri

  1. 1. If you are looking for an expert CyberSecurity Engineer, you have opened the right deck March 2021 Jeremy Quadri {BEng(Hons), CISSP} jeremy@quadriconsulting.com | https://www.linkedin.com/in/jquadri/ ☎ +44 7769 138819 | 🐦 jquadri | Articles: https://jeremyquadri.medium.com/ https://github.com/quadriconsulting
  2. 2. Command Center 4 Vulnerability A ssessm ent Scan everything. 3 Com pliance A ssessm ent Identify external Regulation Control A ssessm ent Identify client’s Controls 2 1 Risk A ssessm ent W here is the exposure.
  3. 3. My guiding principles: 1. Risk Assessment: Where is the exposure? Identify threats and vulnerabilities. 2. Security Control Assessment: Identity the security controls the client has in place. 3. Compliance Assessment: Do we have a security programme that meets the required external authority e.g. ISO 27001 or PCI DSS (Never display complete credit card info back to the user) 4. Vulnerability Assessment: Validate that the technical vulnerabilities are being identified and remediated regularly. Look for exploitable vulnerabilities using OWASP guidelines, scan everything. SQL Injection is high risk. Command Center Description
  4. 4. Worked with exceptional Clients
  5. 5. Technical Motivation Centralise Compliance Management Bridge Security into legacy & New Technology Measure Compliance Activities Leverage CAB Feedback & Checks To Continuously improve Compliance Requirement Bake Engineering Quality Into Client’s Systems Business Motivation
  6. 6. Valued by companions
  7. 7. Year
  8. 8. Foster Security by design Strong Access Control e.g. a federated SSO based SAML & OAuth Cross platform solutions Strong Cryptographic controls Automation capabilities
  9. 9. Strategies & Skills
  10. 10. De-stress Activities

×