I conducted a vulnerability assessment for a Linux-based database system and recommended access control improvements, including MFA and encryption for data in transit.
Additionally, I completed a risk assessment and compliance checklist for a company’s security program, identifying gaps in encryption, password policies, and least privilege implementation.