Post Breach Analytics
Collaborated with a leading technology company to consolidate, analyze, and validate post-breach findings, using custom scripts and exploratory data analysis to support incident response.
← Back to homeCollaborated with a leading technology company to consolidate, analyze, and validate post-breach findings, using custom scripts and exploratory data analysis to support incident response.
← Back to home