Web Developer and Student.
Engineer of operating systems and security of cyber information ... II Collect data, analyzes and drafts by exporting them to reports, including management, project, key indicators and information boards. Ability to develop excellent working relationships with peers and key stakeholders quickly, such as business partners, legal and internal audit professionals and potential technology risks. By working within the Information Security Team.
identify and evaluate priorities and address the risks and security of cybersecurity vulnerabilities Assess cybersecurity threats, risks, vulnerabilities and processes to identify the relative risks of the product, system and organization Analyze relevant policies, standards and procedures against assigned frameworks (NIST, ISO, COBIT, etc.) I help transform the control culture from the current investigative elements into preventive controls I help build safety as a competitive advantage to enable sales ...
See the Pen aymanonymous by Ayman Naser Eddin (@aymannaser) on CodePen.
Description
Greeting Page
Describe
One page provides an overview of what I can do to protect the company's systems.
Description
I am programming the site with the latest programming languages. You can view my work from here