Jan. 12, 2022, 11:42 p.m. | Jym Cheong

Hacker Noon - cybersecurity hackernoon.com

This approach is adapted from a joint paper by Mohammed H. Almeshekah and Eugene H. Spafford, published by Springer International Publishing (Switzerland 2016).

Read All

cyber cyber deception cyber-physical-systems cybersecurity deception deception-technology security systematic-approach

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Level 1 SOC Analyst

@ Telefonica Tech | Dublin, Ireland

Specialist, Database Security

@ OP Financial Group | Helsinki, FI

Senior Manager, Cyber Offensive Security

@ Edwards Lifesciences | Poland-Remote

Information System Security Officer

@ Booz Allen Hamilton | USA, AL, Huntsville (4200 Rideout Rd SW)

Senior Security Analyst - Protective Security (Open to remote across ANZ)

@ Canva | Sydney, Australia