When it comes to interviewing, you cannot prepare enough. Here are some tips from the countless interviews I’ve participated in from both sides of the table. I am going to cover the entire process from soup to nuts, starting with preparation work.
Read the latest release articles and learn without limits.
Simplify your email already
The productivity hack everyone is over complicating, reclaim power back over your inbox and your email management.
SECURITY INCIDENT RESPONSE
Document Scope: This document is intended to define the specific actions and response for security related events that include viruses and malware […]
Useful Powershell Commands for O365
Useful powershell commands for Office 365 and Azure AD: Connecting to O365 from Powershell Command Legal Hold Commands DKIM / DMARC / […]
IT Severity Matrix Template
IT Severity Matrix Severity Definition Action Involved Parties Service Level 1 – All hands site down , mission critical operations or devices […]
Is it Time to Develop a Data Loss Certificate?
There has to be a different approach to data breaches and data losses. Consumers have become complacent in breach after breach. Companies should be advocating their controls and abilities.
After Action Report
Incident ID: Item ID Incident Date Time: Date Time Incident Report Date: Date Completed By: Your Name Here Incident description: Insert […]
Change Control Template
Change Request Form Instructions: Please read carefully, failure to properly adhere to this document or the change process will result in delayed […]
Performance Review Template
Name: Job Title: Form Instructions Use this form to document your view of your performance and the synthesized feedback collected by your […]
Program Increments Technical Debt and Security Value Stream must haves:
Each Program Increment there are some items that need funded from the technical debt and security value stream. These are to ensure […]