Cyber Security Practice: AI | ML Algorithms Leveraging SplunkThis is an ongoing development project with Professor A. Makowski, Dept. of Electrical Engineering, University of Maryland, College Park, MD. The focus is on malware intrusion detection, based on malware invariant behavior within the framework of the kill-chain model or the MITRE ATT&CK framework. Splunk Consulting PracticeEach consulting engagement starts with the development of a detailed SOW and timeline in consultation with the customers. Documenting requirements, performance measures, architecting a solution, deployment, testing and skill transfer follow before the deployed site is turned over to the customer. As needed, maintenance work can be performed. Remote work is an option. Our approach provides major advantages:
Customers: TASC/Engility, Freddie Mac, North American Management, Northrop Grumman, U.S FDA., U.S DHS/CBP, U.S. DHS/HQ/ESOC, U.S. Army GFEBS Cloud Migration. Staff's IT Certifications
Professional Leadership
Federal/State Contracting Vehicles
Additional Resources & Tools for the Security PractitionerChecking on the "reputation" of websites
Dissecting suspicious websites for malware
Current & emerging Internet threats
|
|