April 17, 2022, 5:10 p.m. | Charlie Fletcher

Security – VentureBeat venturebeat.com

By exploring cybersecurity weaknesses in-depth, companies can create actionable plans to shore up their digital integrity.

business computer security computers & electronics cybersecurity datadecisionmakers enterprise enterprise technology log4j security security-vulnerabilities weak points zero trust security

Cybersecurity Consultant

@ Devoteam | Cité Mahrajène, Tunisia

GTI Manager of Cybersecurity Operations

@ Grant Thornton | Phoenix, AZ, United States

(Senior) Director of Information Governance, Risk, and Compliance

@ SIXT | Munich, Germany

Information System Security Engineer

@ Space Dynamics Laboratory | North Logan, UT

Intelligence Specialist (Threat/DCO) - Level 3

@ Constellation Technologies | Fort Meade, MD

Cybersecurity GRC Specialist (On-site)

@ EnerSys | Reading, PA, US, 19605