Profiles search
Skills
• Security Information and Event Management (SIEM): Qradar, Microsoft Sentinel, ELK stack, Splunk
• Intrusion Detection & Prevention System (IDS/IPS): Suricata, Snort
• Endpoint Detection Response (EDR): Microsoft Defender, Cisco AMP
• Vulnerability Scanning: Qualys Guard, Nessus
• Digital Forensics: Autopsy, Sleuth Kit
• Pen Testing Tools: Burp Suite, OWASP ZAP, Nmap, Wireshark
• Policy Development: IT Security Policies, SOPs
• Project Management: Agile, JIRA, S-SDLC
• Cybersecurity Standards: ISO, NIST, CSA (Cloud Security Alliance)
• Privacy Regulations: HIPAA, PCIDSS, GDPR
• Operating System: Kali Linux, Windows, IOS, Linux
• Post Exploitation Framework: Metasploit
• Languages: Python, Bash Scripting