Services

computer, notebook, laptop
IT Security Analyst

You will learn how to interact and participate in a project from the moment your organization is procuring a system to when the project is getting its authorization approval/monitoring.
You will learn the tasks of all stakeholders involved, including ISSO, ISSE, System Owner, Independent Assessor, Common Control Provider, and Authorizing Official.

startup, business, people
IT Security Architect:

You will learn how to design a secured architecture environment and evaluate the risk on the system/project prior to deployment into production environment.
- Secure Software Development Lifecycle (S-SDLC) - Third-Party vendor/contract evaluation/assessment - Develop, Review and Validate hosting attestation such as SOC report (SOC 2 type II) - Design and Evaluate a secure system/network communication solution

Vulnerability Management:

You will learn how to engage with a project team and a continuous monitoring process to reduce enterprise risk and work with the pen testing team. - Conduct a vulnerability assessment and export the result - Communicate, prioritize and categorize the vulnerabilities - Engage with the project team and provide a recommendation for mitigation where necessary
Development of Organizational Essential Documentations:

You will learn how to create and validate organizational Standards and develop a process, policies, and procedures following multiple reliable sources, including NIST, PCI DSS, SANS 20, ISO, and OWASP.

Incident Management:

- Participate in the Incident Handling process - Use of SIEM tool to collect and analyze logs and events - Communicate the incident, react to the incident and prioritize the mitigation

computer, computer code, screen
Programming

With Python, we deliver a hands-on service on designing a web application, desktop application, data science and machine learning, and artificial intelligence (IA).