Experienced with identifying and mitigating cybersecurity threats to protect sensitive data. Utilizes comprehensive knowledge of network security protocols and tools to prevent unauthorized access. Track record of implementing effective incident response strategies and ensuring compliance with industry standards.
Phishing detection