Viscosity North America, Inc. (“Viscosity”) is proud to announce its first Certified Ethical Hacker as it continues to expand its security offerings. As of February 14, 2022, Byron Pearce, Senior Principal Consultant and Security Engineer at Viscosity, was issued his certification as a Certified Ethical Hacker by the EC-Council. The EC-Council, also known as the International Council of E-Commerce Consultants, operates as the world's largest cybersecurity technical certification body. As a Certified Ethical Hacker, Pearce is certified to have expertise in looking for weaknesses and vulnerabilities in target systems to assess security.
As the Senior Principal Consultant and Security Engineer at Viscosity, Pearce works with client organizations to help them properly architect, manage and secure their database, server, and cloud assets to meet their unique business needs. This work can cover various activities, including security assessments and security audits, and help clients design solutions to address gaps and meet privacy and regulatory requirements. Additionally, Pearce drives the internal security for Viscosity, defining internal standards and practices and overseeing the training for security compliance within the organization.
Pearce also serves as a Board Member of the Dallas Oracle Users Group and has served as an author, speaker, and panelist at past Oracle conferences. He was part of multiple invitation-only events to provide direct feedback to the Oracle development team on-site at Oracle Corporation. Besides the CEH, Pearce is also an Oracle Certified Professional (OCP), and an Oracle Certified Specialist (OCS) and has been issued a Certificate of Cloud Security Knowledge (CCSK) by the Cloud Security Alliance.
Certified Ethical Hacker Program
The Certified Ethical Hacker (CEH) credential was introduced in 2003 and is an information security certification that represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. The program introduces the latest hacking techniques, the most advanced hacking tools, and manipulation tactics that hackers use to help information security professionals ensure critical data on secured systems stay secure and don’t possess vulnerabilities.
SUBMIT YOUR COMMENT