{"id":8,"date":"2025-04-26T21:34:03","date_gmt":"2025-04-26T21:34:03","guid":{"rendered":"https:\/\/red-bridge-security.com\/?page_id=8"},"modified":"2025-04-29T09:53:19","modified_gmt":"2025-04-29T09:53:19","slug":"test-page-1","status":"publish","type":"page","link":"https:\/\/red-bridge-security.com\/index.php\/test-page-1\/","title":{"rendered":"About me"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading alignwide\" id=\"we-re-a-studio-in-berlin-with-an-international-practice-in-architecture-urban-planning-and-interior-design-we-believe-in-sharing-knowledge-and-promoting-dialogue-to-increase-the-creative-potential-of-collaboration\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.2px) * 2.094), 48px);line-height:1.1\">I am a freelance cybersecurity consultant based in Paris. With 8 years of experience, primarily within the internal audit departments of large organizations in sectors like telecommunications, financial services, and manufacturing&#8230; I now offer a comprehensive suite of services, including penetration testing, red teaming or GRC audits.<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>I am a freelance cybersecurity consultant based in Paris. With 8 years of experience, primarily within the internal audit departments of large organizations in sectors like telecommunications, financial services, and manufacturing&#8230; I now offer a comprehensive suite of services, including penetration testing, red teaming or GRC audits.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/red-bridge-security.com\/index.php\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/red-bridge-security.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/red-bridge-security.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/red-bridge-security.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/red-bridge-security.com\/index.php\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":4,"href":"https:\/\/red-bridge-security.com\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":47,"href":"https:\/\/red-bridge-security.com\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions\/47"}],"wp:attachment":[{"href":"https:\/\/red-bridge-security.com\/index.php\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}