Aug. 29, 2022, 4 a.m. | SECTION 9

SECTION 9 Cyber Security section9.us

We’re scanning our network with runZero to get an inventory of devices. What did it find? What can we learn from this inventory? How well does it work? fix? Do we have any security controls in place? Can we wait to implement the CIS controls?

devices runzero

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom