Cyber Security Professional with experience in Identity Access management settings. Forward-thinking when reviewing project requirements to determine precise solutions. Composed professional when working under tight schedules and limited budgets to achieve innovative designs meeting and exceeding objectives.
Certified Ethical Hacker