Decision Makers
Chief Information Officer
They are in charge of a company's computer and information systems, evaluate current procedures, suggest software updates, and advise the executive team on the most effective procedures. E-mail: r****@hotmail.com, is available on SoftwareOfficial.
Manager
This Manager is in charge of making strategically significant decisions. E-mail: j****@lycos.com, is available on SoftwareOfficial.
Founder
They collaborate with a board of executives to provide excellent leadership for the corporation, set short and long-term goals, plans, and strategies for the organization and ensure that they are met. E-mail: j****@mail.com, is available on SoftwareOfficial.
Company Details
Last Update
Jul 14, 2022
Location
4500 5Th Ave, Pittsburgh, PA 15213
Industry
Computer & Network Security
Specialties
Network Survivability
Network Situational Awareness
Incident Response
Insider Threat
Founded
1988
Number of Employee
501-1000 employees
NAICS
334 - Computer and Electronic Product Manufacturing
FAQs about decision-makers at CERT Division at the Software Engineering Institute
What is the current location of the Cert Division At The Software Engineering Institute?
The company Cert Division At The Software Engineering Institute address is in Pittsburgh, Pennsylvania state.
What's the industry affiliated with Cert Division At The Software Engineering Institute?
The main industry in which Cert Division At The Software Engineering Institute operates is Computer & Network Security.
Who are the decision-makers in Cert Division At The Software Engineering Institute?
The decision-makers of the company are Jeff Schaatt, Richard Caralli etc.
What are the specialties of the main decision-makers in Cert Division At The Software Engineering Institute?
The professions of the company decision-makers are Chief Information Officer or Manager etc.
What are the specialties of Cert Division At The Software Engineering Institute?
The special fields for Cert Division At The Software Engineering Institute are Network Survivability, Network Situational Awareness, Incident Response, Insider Threat, and Computer Forensics