{"id":120,"date":"2023-08-04T17:39:35","date_gmt":"2023-08-04T17:39:35","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2023-11-02T22:58:38","modified_gmt":"2023-11-02T22:58:38","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aacyber\/","title":{"rendered":"Home"},"content":{"rendered":"\n<p>Cyber Security Analyst having expert knowledge, extensive experience, and a solid grasp of information technology. Specialized in Splunk-based SIEM&#8217;s proactive network monitoring. Possess a thorough understanding of recognizing and assessing suspicious events. Professional versatility and aptitude for handling delicate materials. Able to perform log and packet analysis using a variety of security tools. Malware analysis can be performed to secure the confidentiality, integrity, and availability of the systems, networks, and data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Analyst having expert knowledge, extensive experience, and a solid grasp of information technology. Specialized in Splunk-based SIEM&#8217;s proactive network monitoring. Possess a thorough understanding of recognizing and assessing suspicious events. Professional versatility and aptitude for handling delicate materials. Able to perform log and packet analysis using a variety of security tools. Malware analysis&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aacyber\/\">Read More<\/a><\/div>\n","protected":false},"author":27074,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/users\/27074"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/pages\/120\/revisions\/346"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}