Services
IT Security Analyst
You will learn how to interact and participate in a project from the moment your organization is procuring a system to when the project is getting its authorization approval/monitoring.
You will learn the tasks of all stakeholders involved, including
ISSO, ISSE, System Owner, Independent Assessor, Common Control Provider, and Authorizing Official.
IT Security Architect:
You will learn how to design a secured architecture environment and evaluate the risk on the system/project prior to deployment into production environment.
- Secure Software Development Lifecycle (S-SDLC)
- Third-Party vendor/contract evaluation/assessment
- Develop, Review and Validate hosting attestation such as SOC report (SOC 2 type II)
- Design and Evaluate a secure system/network communication solution
Vulnerability Management:
You will learn how to engage with a project team and a continuous monitoring process to reduce enterprise risk and work with the pen testing team.
- Conduct a vulnerability assessment and export the result
- Communicate, prioritize and categorize the vulnerabilities
- Engage with the project team and provide a recommendation for mitigation where necessary
Development of Organizational Essential Documentations:
You will learn how to create and validate organizational Standards and develop a process, policies, and procedures following multiple reliable sources, including NIST, PCI DSS, SANS 20, ISO, and OWASP.
Incident Management:
- Participate in the Incident Handling process - Use of SIEM tool to collect and analyze logs and events - Communicate the incident, react to the incident and prioritize the mitigation
Programming
With Python, we deliver a hands-on service on designing a web application, desktop application, data science and machine learning, and artificial intelligence (IA).