Deadline-driven. Solutions-oriented. Independent worker. Agile and adaptable to a dynamic work environment
- Utilize advanced search techniques, including social media and professional networks, to identify and
threats, including malware, phishing, ransomware, and social engineering attacks. Proficiency in security technologies