M""MMMMMMMM dP M""M M""""""""M MM'"""""`MM M MMMMMMMM 88 M M Mmmm mmmM M' .mmm. `M M MMMMMMMM .d8888b. .d8888b. .d8888b. 88 M M MMMM MMMM M MMMMMMMM dP dP dP dP M MMMMMMMM 88' `88 88' `"" 88' `88 88 M M MMMM MMMM M MMM `M 88 88 88 88 M MMMMMMMM 88. .88 88. ... 88. .88 88 M M MMMM MMMM M. `MMM' .M 88. .88 88. .88 M M `88888P' `88888P' `88888P8 dP M M MMMM MMMM MM. .MM `88888P' `8888P88 MMMMMMMMMMM MMMM MMMMMMMMMM MMMMMMMMMMM .88 d8888P
Privacy Advocate
Security Operation Center analyst
A seasoned Network security enthusiast
Network Engineering
Network Security auditing
Operating System Security
Endpoint Response Management