{"id":20,"date":"2026-01-25T04:03:20","date_gmt":"2026-01-25T04:03:20","guid":{"rendered":"https:\/\/hu-the-geek-consulting-3103f3.ingress-alpha.ewp.live\/?page_id=20"},"modified":"2026-02-14T22:30:44","modified_gmt":"2026-02-14T22:30:44","slug":"about","status":"publish","type":"page","link":"https:\/\/huthegeek.com\/cybersecurity\/about\/","title":{"rendered":"About"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Proven Track Record<\/strong><\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-4840c40e wp-block-columns-is-layout-flex\" style=\"padding-right:24px;padding-left:24px\">\n<div class=\"wp-block-column is-vertically-aligned-stretch has-border-color has-base-color has-accent-4-background-color has-text-color has-background has-link-color wp-elements-25249fe7cb9b2b8f70635f0660fe1140 is-layout-flow wp-block-column-is-layout-flow\" style=\"border-color:#00d4ff;border-width:2px\">\n<ul class=\"wp-block-list\">\n<li>Cisco Pioneer Product of the Year Award (2005)<\/li>\n\n\n\n<li>Spot Light Award from Verizon<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul style=\"border-color:#00d4ff;border-width:2px\" class=\"wp-block-list has-border-color has-base-color has-accent-4-background-color has-text-color has-background has-link-color wp-elements-c3597c98493b8cbd13863f1ff7d13225\">\n<li>Cisco Certified DevNet Associate<\/li>\n\n\n\n<li>CCNA<\/li>\n\n\n\n<li>ITILv3<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Technical Stack<\/strong><\/h3>\n\n\n\n<ul style=\"color:#00d4ff;background-color:#383838\" class=\"wp-block-list has-text-color has-background has-link-color wp-elements-91c76f3683d7a9980dfebf3975adc1c7\">\n<li>Networking programming in <mark style=\"background-color:rgba(0, 0, 0, 0);color:#9ffa8e\" class=\"has-inline-color\">Go<\/mark>, <mark style=\"background-color:rgba(0, 0, 0, 0);color:#9ffa8e\" class=\"has-inline-color\">Rust<\/mark> and <mark style=\"background-color:rgba(0, 0, 0, 0);color:#9ffa8e\" class=\"has-inline-color\">C\/C++<\/mark>, application programming in <mark style=\"background-color:rgba(0, 0, 0, 0);color:#eaa980\" class=\"has-inline-color\">Django<\/mark>, <mark style=\"background-color:rgba(0, 0, 0, 0);color:#e8f99d\" class=\"has-inline-color\">NodeJS<\/mark><\/li>\n\n\n\n<li>Cisco Cybersecurity, Secure Access, Secure Edge, OCSF Standardization<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Insurance Advantage<\/strong><\/h3>\n\n\n\n<div class=\"wp-block-media-text\" style=\"grid-template-columns:15% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/huthegeek.com\/cybersecurity\/wp-content\/uploads\/2026\/02\/shield-check-1.svg\" alt=\"\" class=\"wp-image-140 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p>I bridge the gap between high-performance software engineering and strategic risk mitigation<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"has-accent-6-background-color has-background\">Insurance practitioner, consultation on <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#00d4ff\" class=\"has-inline-color\">cyber insurance<\/mark><\/strong> policies, coverages<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Proven Track Record Technical Stack Insurance Advantage I bridge the gap between high-performance software engineering and strategic risk mitigation Insurance practitioner, consultation on cyber insurance policies, coverages<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-20","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/pages\/20","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":1,"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":142,"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/pages\/20\/revisions\/142"}],"wp:attachment":[{"href":"https:\/\/huthegeek.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}