“John excels at identifying the needs of co-workers, then researching and implementing the right tech stack match. His passion for technology easily cuts through challenging roadblocks so deployment arrives on schedule. One of John's greatest characteristics is listening to feedback and enhancing the requirements so the platform/software generates a greater output of productivity for the end-user. John is professional at all times and his warm personality elevates the atmosphere of any team. I would greatly welcome the opportunity to work with him again.”
About
As a Quality Software Engineer at General Motors, I collaborate with cross-functional…
Contributions
-
What do you do if your network security is compromised?
1. Isolate systems corrupted to stop more damage from happening. 2. Determine what was hacked and how it happened. 3. Tell the right people about the breach. 4. Fix holes in the security and bring up-to-date safety measures. 5. Figure out how the breach happened. 6. Get back systems and recover files that were damaged from backups. 7. Figure out what parts of the security rules could be better. 8. Be on the lookout for any more illegal entry. 9. Use what we have learned from this event to make security better.
Experience
Education
Licenses & Certifications
Recommendations received
7 people have recommended John
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More