If an adversary can be detected when they are preparing to tunnel into a network, the infrastructure can be shut down and action can be taken to save the compromised machines before any damage is done.
However, the ideal doesn’t always happen. That’s why Jessica works hard every day to trace malicious activity. She creates case files to record incidents and preserves any forensic evidence to help the security team figure out how the bad guys got in. She’s also one of our go-to-gals for troubleshooting email related problems.
When she’s not engaged in cyber warfare, Jessica enjoys spending her time watching anime and planning for her first big trip to Japan this year.