Involved evaluating and implementing best practices to protect a business from internal and external threats.
Delivered the governance process framework for certification of application access and introduced transformation standards. The activities included evaluating and implementing security best practices to protect a healtcare client from internal and external threats.
The goal was to discover any flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy.
4 Steps of the Vulnerability Management Process
OWASP Top Vulnerabilities:
2019
Quadax Inc.
45 Days
40 out of 100