speaker-photo

Jeremiah Wilson

Security Analyst at Prescient Security

Intuitive Security Analyst with a passion for tech security. I Audit and ensure the compliance of over a dozen companies.

๐™Ž๐™ค๐™ข๐™š ๐™ค๐™› ๐™ข๐™ฎ ๐™ž๐™ฃ๐™ฉ๐™š๐™ง๐™š๐™จ๐™ฉ๐™จ ๐™ž๐™ฃ๐™˜๐™ก๐™ช๐™™๐™š:

โ€ข Threat hunting, vulnerability scanning, and management
โ€ข Hardening the security within my own personal network
โ€ข Managing information security systems
โ€ข Exploring Kali Linux tools and features
โ€ข Creating network topologies

๐™„ ๐™œ๐™š๐™ฉ ๐™š๐™ญ๐™˜๐™ž๐™ฉ๐™š๐™™ ๐™–๐™—๐™ค๐™ช๐™ฉ ๐™ค๐™ฅ๐™ฅ๐™ค๐™ง๐™ฉ๐™ช๐™ฃ๐™ž๐™ฉ๐™ž๐™š๐™จ ๐™ฌ๐™๐™š๐™ง๐™š ๐™„ ๐™˜๐™–๐™ฃ ๐™ก๐™š๐™–๐™ง๐™ฃ ๐™›๐™ง๐™ค๐™ข ๐™๐™ž๐™œ๐™๐™ก๐™ฎ ๐™จ๐™ ๐™ž๐™ก๐™ก๐™š๐™™ ๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ž๐™ฃ๐™™๐™ž๐™ซ๐™ž๐™™๐™ช๐™–๐™ก๐™จ ๐™–๐™จ ๐™ฌ๐™š๐™ก๐™ก ๐™–๐™จ ๐™ž๐™ข๐™ฅ๐™ก๐™š๐™ข๐™š๐™ฃ๐™ฉ ๐™ข๐™ฎ ๐™ค๐™ฌ๐™ฃ ๐™ž๐™ฃ๐™›๐™ค๐™ง๐™ข๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™ ๐™ฃ๐™ค๐™ฌ๐™ก๐™š๐™™๐™œ๐™š.