...stem implementation (e.g. ERP/CRM/HRM/banking system), cybersecurity, investigation of cyber hacking incidents, system development, DevOps maintenance, etc.
~Qualified in or Participant of either CISA, CISSP, ISO27001, CEH, CISM or CHFI (Computer Hacking Forensic Inve...