Balancing security and business goals through well designed security architectures.
Checking security using pen testing techniques.
Auditing security processes.
Specialties: CISSP, ISSAP, ISSMP, CISA, CISM, CEH, LPT
Contact Details
Tags
bugbountycyber security continuous testing agileagile security iso 27001 risk managementpkisslcryptosecurity
Balancing security and business goals through well designed security architectures.
Checking security using pen testing techniques.
Auditing security processes.
Specialties: CISSP, ISSAP, ISSMP, CISA, CISM, CEH, LPT
Tags
bugbountycyber security continuous testing agileagile security iso 27001 risk managementpkisslcryptosecurity