Nov. 16, 2023, 8:16 a.m. |

System Weakness - Medium


Analyzing the security of a company’s surface is one of the main tasks of corporate information security specialists. In large organizations, entire departments are engaged in this, in small organizations, it is one or two people. However, it can be difficult to keep track of what software a company’s employees are using, and because of this, something may escape the eye of a specialist. In this article, I will tell you how to partially automate the process of vulnerability …

attack surface automation bug bounty corporate departments find information information security large main netlas organizations own people reconnaissance script security small organizations software track vulnerable

Paid internship - Cybersecurity [BGSW]

@ Bosch Group | Warszawa, Poland

Cybersecurity Officer

@ People In Need | Prague 2, Prague, Czechia

University -Cybersecurity Consultant

@ Booz Allen Hamilton | USA, CA, San Diego (1615 Murray Canyon Rd)

Senior Security Engineer, Detection Engineering

@ Lyft | Seattle, WA

Architecte de la sécurité des applications / Application Security Architect

@ Genetec | Montreal, Quebec, Canada

Telecommunications Sector| SIEM Engineer

@ Devoteam | Lisbon, Portugal