Aug. 15, 2022, 4:32 a.m. | SECTION 9

SECTION 9 Cyber Security section9.us

Time to get an accurate inventory of the devices on our network. Once we have an inventory, we can move on to policies and procedures.

cis cis controls controls hardware inventory

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Associate Manager, BPT Infrastructure & Ops (Security Engineer)

@ SC Johnson | PHL - Makati

Cybersecurity Analyst - Project Bound

@ NextEra Energy | Jupiter, FL, US, 33478

Lead Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts

Junior Information Security Coordinator (Internship)

@ Garrison Technology | London, Waterloo, England, United Kingdom

Sr. Security Engineer

@ ScienceLogic | Reston, VA