Vulnerability Assessment
Compliance Assessment
Network Security Analysis
Incident Response
Threat Hunting
SIEM Triage
Alert monitoring
Shell Scripting
Automation
Host Security Analysis
Digital Forensics • Cloud Security • Process Improvement
Project Management
Troubleshooting
Communication
Team leadership