Journal 5

Create DiD protocols for a company

YouTube security analyst employee

Bug bounties

Enforcing company cyber policy/

Recon, good to use against organizations as a red team memeber

Secure employer network infrastructure

Entering ctf events for money

Cracking passwords, as a red teamer

URL attacks (red team)

Recovery phase after a cyber event

Intelligence gathering/recon

Testing company security protocols

YouTube security project manager

Leave a Reply

Your email address will not be published. Required fields are marked *