Services:
Vulnerability assessment and penetration testing - Vulnerabilité et tests d'intrusion
Security incident management - Gestion des incidents de sécurité
Security architecture - Solutions d'architecture de sécurité
Risk analysis - Analyse de risque
Conformity management - Gestion de la conformité
Security infrastructure implementation - Déploiement d'infrastructure de sécurité
Network architecture - Solution d'architecture réseau
Security technologies - Technologies de sécurité:
Access Data Forensic ToolKit - FTK
X-Ways Forensics
Volatility Framework
Certifications:
IACRB CSSA
GIAC GSEC, GCED, GCFE, GCFW, GCIA, GCIH, GCFA
ITIL V3 Fundation, CISSP, CISA
Security control