I am an Experienced Cyber Security professional worked in multinational organizations and designed, implemented, integrated security controls. I have credentials well recognized in the sector such as CISSP, CEH Master, ECIH, BTL-1.
I am providing services of:
* Design, implementation of security controls based on needs and requirements;
* Cyber Security related consultation;
* Integration and tuning of security tools like Threat Intel, XDR, SIEM, DLP, Endpoint protection. Increasing the efficiency of tools and adoption, increasing ROI on expensive security tools;
* Malware Analysis, Phishing/Malicious mail analysis and implementation of detection methods;
* Design and implementation of security related software. I provide infra-as-code approach for easier adoption and utilization
I can't rate Kaan high enough. We had a major problem with our Python scraping software that needed immediate attention as the entire office was on hold. He worked straight through (with very little sleep) to program and get our system running again. We could not be happier. Thanks again
Earners of the Blue Team Level 1 Certification have showcased their practical ability to defend networks and systems from cyber threats through technical and hands-on defensive cybersecurity training. They have knowledge and ability across 5 security operations domains which include Phishing Analysis, Digital Forensics, Threat Intelligence, SIEM, and Incident Response.
EC-Council Certified Incident Handler
A Certified Incident Handler is a skilled professional who is able to handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling.
A certified CEH (Master) is an expert in his field, who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, he is also well versed with ethical hacking techniques and has demonstrated the same when tested in an environment that mimics a real corporate network through the use of live virtual machines, networks, and applications, designed to test your skills.
Kaan Sadik K. ile işiniz hakkında iletişime geçin
Sohbet üzerinden herhangi bir detayı tartışmak için giriş yapın.