IT security Analysis, Monitoring and reviews spanning PCI-DSS, network / application security and compliance; managing and implementing DLP and SIEM products and process using COBIT; process design implementation and measurement;
Well versed in Web application security, Source code review, SQL Injection, URL Manipulation WAF , CSS, Network, wireless , telephone assessment, Social Engineering ,Next Generation Firewall, Process design, implementation and measurement.
Networking and the OSI model, firewall technologies, intrusion detection systems (IDS), IPS, HIPS, SSH, cryptography, antivirus, operating systems (including scripting), general security practices (physical and virtual), application security, and the common vulnerabilities and attacks that are in the environment.
The cyber world is changing faster than the security and this leaves us vulnerable to cyber-crimes. Enterprises of the future need to adopt a comprehensive cyber security strategy to safeguard against risks and threats.
They need to implement and regular maintenance and monitoring of their security management programs through reliable technical support programs.
Cyber Security Managed Services monitor, implement, maintain and enhance enterprise’s cyber security.