Aug. 11, 2022, 1:37 a.m. | Dark Reading Staff, Dark Reading

Dark Reading www.darkreading.com

The new open source tools are designed to help defense, identity and access management, and security operations center teams discover vulnerable network shares.

adversary adversary simulation open source open source tools simulation tools

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Regional Leader, Cyber Crisis Communications

@ Google | United Kingdom

Regional Intelligence Manager, Compliance, Safety and Risk Management

@ Google | London, UK

Senior Analyst, Endpoint Security

@ Scotiabank | Toronto, ON, CA, M1K5L1

Software Engineer, Security/Privacy, Google Cloud

@ Google | Bengaluru, Karnataka, India

Senior Security Engineer

@ Coinbase | Remote - USA