When it comes to interviewing, you cannot prepare enough. Here are some tips from the countless interviews I’ve participated in from both sides of the table. I am going to cover the entire process from soup to nuts, starting with preparation work.
Read the latest release articles and learn without limits.
The productivity hack everyone is over complicating, reclaim power back over your inbox and your email management.
Document Scope: This document is intended to define the specific actions and response for security related events that include viruses and malware […]
Useful powershell commands for Office 365 and Azure AD: Connecting to O365 from Powershell Command Legal Hold Commands DKIM / DMARC / […]
IT Severity Matrix Severity Definition Action Involved Parties Service Level 1 – All hands site down , mission critical operations or devices […]
There has to be a different approach to data breaches and data losses. Consumers have become complacent in breach after breach. Companies should be advocating their controls and abilities.
Incident ID: Item ID Incident Date Time: Date Time Incident Report Date: Date Completed By: Your Name Here Incident description: Insert […]
Change Request Form Instructions: Please read carefully, failure to properly adhere to this document or the change process will result in delayed […]
Name: Job Title: Form Instructions Use this form to document your view of your performance and the synthesized feedback collected by your […]
Each Program Increment there are some items that need funded from the technical debt and security value stream. These are to ensure […]