Debra B. looks like a good fit?

We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?

Schedule Interview Now

Debra B. Cloud, Security and Compliance Platforms

My name is Debra B. and I have over 3 years of experience in the tech industry. I specialize in the following technologies: Information Security, Public Speaking, ISO 27001, Information Technology, Cloud Security, etc.. I hold a degree in Bachelor's degree. Some of the notable projects I've worked on include: A Practical Guide to SOC2 Compliance, How to Get FedRAMP Authorized, CISO Guide to Cyber Resilience, Ransomware Protection, Multi-factor Authentication, etc.. I am based in Raleigh, United States. I've successfully completed 8 projects while developing at Softaims.

I approach every technical challenge with a mindset geared toward engineering excellence and robust solution architecture. I thrive on translating complex business requirements into elegant, efficient, and maintainable outputs. My expertise lies in diagnosing and optimizing system performance, ensuring that the deliverables are fast, reliable, and future-proof.

The core of my work involves adopting best practices and a disciplined methodology, focusing on meticulous planning and thorough verification. I believe that sustainable solution development requires discipline and a deep commitment to quality from inception to deployment. At Softaims, I leverage these skills daily to build resilient systems that stand the test of time.

I am dedicated to making a tangible difference in client success. I prioritize clear communication and transparency throughout the development lifecycle to ensure every deliverable exceeds expectations.

Main technologies

  • Cloud, Security and Compliance Platforms

    3 years

  • Information Security

    1 Year

  • Public Speaking

    2 Years

  • ISO 27001

    1 Year

Additional skills

  • Information Security
  • Public Speaking
  • ISO 27001
  • Information Technology
  • Cloud Security
  • Governance, Risk Management & Compliance
  • Information Security Awareness
  • Cloud Security Framework
  • Cloud Computing
  • CMMC
  • SOC 2
  • Disaster Recovery
  • Company Policy
  • Policy Writing

Direct hire

Potentially possible

Previous Company

TrustedCISO

Ready to get matched with vetted developers fast?

Let's get started today!

Hire Remote Developer

Experience Highlights

A Practical Guide to SOC2 Compliance | EC-Council Learning

A Practical Guide to SOC 2 Compliance provides participants with a thorough understanding of the SOC 2 framework, focusing on the five Trust Services Criteria (TSC) - Security, Availability, Processin

How to Get FedRAMP Authorized | LinkedIn Learning Course

Learn the step-by-step process to achieve FedRAMP (Federal Risk and Authorization Management Program) authorization with my LinkedIn Learning course, "How to Get FedRAMP Authorized." This course is de

CISO Guide to Cyber Resilience

This is my book on Cyber Resilience. Don't just check the box, but build a resilient cybersecurity program.

Ransomware Protection

I wrote this Ransomware Protection Strategies White Paper and applied these principles to ensure the customer's network was ransomware resilient.

Multi-factor Authentication

One of the first security safeguards I recommend is Multi-Factor Authentication because it will protect from 99% of account attacks and it's free when using Google or Microsoft Authenticator.

Education

  • University of Houston

    Bachelor's degree in

    1988-01-01-1991-01-01

Languages

  • English (Native or Bilingual)