↳
Tenho algumas experiências com vendas e preciso de um emprego
↳
Tenho experiência com venda online,e gostaria muito de trabalhar nessa empresa
↳
Tenho experiência em postagem de publicidade, informações e comunicação social.
↳
More than enough to call out a lazy leader
↳
I think nothing will change if all recruiters in the world are fired.
↳
Finally, we hired somebody after 6 months. With COVID-19, we will fire him soon. Seems like a looser who will not survive Less
↳
And the role reports to a VP, customer success. What a joke and looks like they need a glorified secretary and a throat to choke Less
↳
They will ask for your salary range and if you ask the range on their end they will say they don’t know yet Less
↳
They hired somebody for cheap. With probably very minimal HIPAA knowledge and an expired CISSP credential. Less
↳
Sounds like a honeypot question to ask ☺
↳
This is what gets most people so be prepared to answer it.
↳
Listen to them. Most of the time there is a legitimate problem and you can be the difference between a good outcome or bad. Listen to them and try to offer a solution before getting aggressive, calling the police or even back up. The irate person doesnt want to see more people show up, they want to see you TRYING to help. Less
↳
I rambled since I was not impress with the whole process especially when the person asking the question muted their own phone when they stated to ask the question. Less
↳
TCP IP is a representation of suite of protocols for Open Systems Interconnection (OSI Model) At layer 7 - eg SFTP, Https, SSH for secured services At layer 6 - Session layer: port numbers At layer 5 - presentation eg ascii, mpeg, jpeg, etc At layer 4- Transmission Layer TCP Secure connection for encryption eg. AES, SHA 256 and higher algorithm and UDP protocols which are generally unreliable Layer 3- IP protocol network layer Layer 2 - Datagram layer eg. Mac address , ARP RARP Layer 1 - Physical Layer, Cat 5, Cat6, Cat 7, etc Less
↳
TLS / SSL: what is it and what does it do
↳
There is no cyber security without integrity. I was raised under strict rules, went to private school all my life, I learned from little how to be ethical. And now it's imprinted in me. And I have no problem, actually, I feel joy when I do what's right. For example, I always follow written policies stating I cannot access co-worker's medical records so I just don't. And then I go home, knowing I did what was right. Less
↳
Integrity is the act of keeping something unaltered or modify by an unauthorized party. It’s one of the core of cybersecurity called CIA trials There is no cybersecurity without integrity. I always follow policies stating I can’t have access to a particular information in our environment , so I just don’t try to get those information. I do what Is said to be done then go home Less