You are here:
Threat analysis, vulnerability assessment, compliance assessment, policy audit, awareness training, secure architecture design, disaster recovery planning, deployment/implementation issues, network monitoring, incident handling, attack remediation, identity management, penetration testing, intrusion monitoring, countermeasures, secret "shopping"/social engineering, and light forensics
I've been involved in security research for many years and love the craft! It's worthy work and makes my parents proud.
Manufacturing, financial/banking, legal, expert witness, hot shot remediation