Ali Chisom
I'm always excited to take on new projects and collaborate with innovative minds.
Lagos
Providing technical assistance for computer systems, software, and networks, ensuring users can work efficiently by resolving issues like hardware/software problems, network glitches, and password resets, while also handling installations, configurations, and system maintenance to keep an organization's technology running smoothly and securely.
Deep investigation of malicious software (viruses, ransomware, etc.) to understand its behavior, capabilities, and intent, using techniques like static and dynamic analysis to uncover hidden functions, build defenses and create effective countermeasures for incident response and threat hunting.
Structured process for handling cybersecurity events, aiming to identify, contain, and resolve threats like breaches or attacks quickly to minimize damage, costs, and disruption, involving phases like Preparation, Detection/Analysis, Containment/Eradication/Recovery, and Post-Incident Activity, guided by a documented plan and involving IT, leadership, and legal teams