Completed a professional cybersecurity course with hands-on experience in simulators for ICT systems defense; strong familiarity with a variety of monitoring and information security tools, as well as communication protocols; highly motivated to learn and develop, with proven ability to work effectively in teams and perform under complex 24/7 environments.