SlideShare a Scribd company logo
1 of 16
 
 
 
 
But, currently: My friends say that I’m very friendly,  and that I am a excellent writer. They also say that I shouldn’t sing.
Online resources tell me that I am very artistic, but even  more so that I am investigative.
 
 
Professionally, though… ,[object Object]
My dreams fit my personality According to my Myer’s Briggs survey,  I am a very investigative person.  This is a good fit for a career in journalism.
I also like playing kickball and handball,  though I don’t do either outside of gym class. Other things I enjoy
My strengths include  writing, organizing, and coloring.
I would like to live near a beach. I do not have many personal struggles. I have worked at Acme, as a bagger.
[object Object],I am a creative, investigative young lady who enjoys a challenge, and appreciates being recognized for her hard work.
Contact Information ,[object Object],[object Object]
[object Object],[object Object],[object Object]

More Related Content

What's hot

What's hot (20)

Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR ModernizationApache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
cyber security
cyber securitycyber security
cyber security
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
USPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability ManagementUSPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability Management
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 

Viewers also liked (8)

Who am i presentation
Who am i presentationWho am i presentation
Who am i presentation
 
Who am i powerpoint
Who am i powerpointWho am i powerpoint
Who am i powerpoint
 
Who am i presentation
Who am i presentationWho am i presentation
Who am i presentation
 
Who am i powerpoint
Who am i powerpointWho am i powerpoint
Who am i powerpoint
 
Who am i ppt
Who am i pptWho am i ppt
Who am i ppt
 
Who am i slideshow
Who am i slideshowWho am i slideshow
Who am i slideshow
 
Who Am I
Who Am IWho Am I
Who Am I
 
Who Am I
Who Am IWho Am I
Who Am I
 

Who am i presentation

  • 1.  
  • 2.  
  • 3.  
  • 4.  
  • 5. But, currently: My friends say that I’m very friendly, and that I am a excellent writer. They also say that I shouldn’t sing.
  • 6. Online resources tell me that I am very artistic, but even more so that I am investigative.
  • 7.  
  • 8.  
  • 9.
  • 10. My dreams fit my personality According to my Myer’s Briggs survey, I am a very investigative person. This is a good fit for a career in journalism.
  • 11. I also like playing kickball and handball, though I don’t do either outside of gym class. Other things I enjoy
  • 12. My strengths include writing, organizing, and coloring.
  • 13. I would like to live near a beach. I do not have many personal struggles. I have worked at Acme, as a bagger.
  • 14.
  • 15.
  • 16.