This document lists various IT security certifications including CISSP, GIAC, ISA, PCIP, ISO 27001, SANS, MCSE, CCIE, GCIA, GCIH, CEH and OSCP. It also mentions experience with identity access management, Akamai and DDoS attacks, network and host security, firewalls, vulnerability scanning, intrusion detection, database security, network security policies, penetration testing, and computer forensic investigation processes.
This document lists various IT security certifications including CISSP, GIAC, ISA, PCIP, ISO 27001, SANS, MCSE, CCIE, GCIA, GCIH, CEH and OSCP. It also mentions experience with identity access management, Akamai and DDoS attacks, network and host security, firewalls, vulnerability scanning, intrusion detection, database security, network security policies, penetration testing, and computer forensic investigation processes.
This document lists various IT security certifications including CISSP, GIAC, ISA, PCIP, ISO 27001, SANS, MCSE, CCIE, GCIA, GCIH, CEH and OSCP. It also mentions experience with identity access management, Akamai and DDoS attacks, network and host security, firewalls, vulnerability scanning, intrusion detection, database security, network security policies, penetration testing, and computer forensic investigation processes.
testing) Database security (database management and configuration) Network security (Firewall management, network zone policies) Knowledge in vulnerability scanning, intrusion detection, anomaly detection, and associated technologies and intrusion detection\prevention systems Understanding of tools, techniques, and standards used to conduct penetration testing of networks and applications Best practices related to information and computer forensic investigation processes and techniques