👨💻 About Jason
Cybersecurity analyst with a passion for protecting networks and hunting threats. I specialize in ethical hacking, digital forensics, and incident response.
Cybersecurity analyst with a passion for protecting networks and hunting threats. I specialize in ethical hacking, digital forensics, and incident response.
“A zero-day malware bypassed EDR. I reverse engineered it in 3 hours and patched our systems overnight. Not bad for a Monday.”
What port does HTTPS typically use?
Ask about my experience or tools I use!
Email: jason@example.com
LinkedIn: linkedin.com/in/jasontshaka
📎 Download CV (PDF)Thanks for visiting the deck.