Expert in protecting information systems and networks against threats. Experienced in implementing security protocols, conducting vulnerability assessments, and managing incident responses. Proven ability to enhance system security posture and decrease data breach incidents.