Scanned multiple systems to identify weak points, highlighting critical vulnerabilities for immediate attention.
Conducted realistic phishing simulations to test employee awareness and improve response strategies.
Led rapid response drills to contain breaches and minimise damage in controlled cyber attack scenarios.
Performed thorough audits reviewing policies and configurations to strengthen overall security posture.