Personal Information
Organization / Workplace
Houston, Texas Area United States
Occupation
GCFA, GCIH, CHFI, CEH | Cybersecurity Nerd
About
Accomplished cybersecurity professional with experience and training supporting enterprise-scale cybersecurity operations utilizing cyber threat intelligence analytics and technical operations. A dedicated technician and analyst, approaching cybersecurity with the mindset as both an attacker and a defender. Seeking to transition to an environment where a meaningful contribution will be made to countering cyber threats. Adaptable to any situation with the ability to assist in operations, training, and planning to accomplish organizational goals. In a team or solo work role, employs out-of-the-box critical thinking, methodical research, logical procedures, and multitasking during fast pace...
- Presentations
- Documents
- Infographics
Privilege Escalation And Misconfigurations Part2
Caleb Sima
•
15 years ago
Models of Escalation and De-escalation in Cyber Conflict
Zsolt Nemeth
•
12 years ago
"Cross domain” deterrence, escalation geometries and the morphing of strategy
Lawrence Livermore National Laboratory
•
9 years ago
Fundamentals of Linux Privilege Escalation
nullthreat
•
9 years ago
Ultimate pen test compromising a highly secure environment (nikhil)
ClubHack
•
13 years ago