I am a Industry certified (CISSP, GSEC) Information Security Specialist who specializes in Vulnerability assessments and Penetration Testing. I have worked with Ivy League Universities, government agencies and private organizations. I have been formally trained in Network defense and Offense, Malware Analysis and Intrusion Detection. I have also worked with clients to provide Risk Assessments for various applications, 3rd party vendors and systems design.
I have a Masters degree in Information System Security. I taught Network Security at the University of Phoenix for 5 years. I have 15 years of experience with risk assessment, vulnerability assessment and penetration testing including social engineering.
My field of interest is IT Security, Computer Forensics, Incident Response, Vulnerability Management, SIEM, Remote Infrastructure Security Management. - 10+ years experience in Information Security Specialties: ???? Incident Response and Cyber Forensics ???? Information System & Network Security Auditing. ???? Vulnerability Assessment & Penetration Testing. ???? Risk Assessment, Incident Response and Disaster Recovery Management. ???? System Administration ???? Shell/Bash scripting ???? Linux customization and Security ???? Security Information and Event Management ???? Infrastructure Security Monitoring and Management Trainings: Digital Forensics: SANS FOR408(Windows in Depth) & CHFI Training Ethical Hacking: CEH(Certification), SANS SEC575: Mobile Device Security and Ethical Hacking Training BS 25999 (BCMS Implementation) Certification ISMS/Compliance: ISO 27001 Lead Auditors (Training) System/Security Administration: RHCE (Red Hat Certified Engineer) V 3/4
I am based in Miami, FL USA. I have 12 years of real world security experience supporting private corporations and multiple federal agencies. I have experience working with clients in the United States, Europe, Asia, and the Middle East. I specialize in incident response, penetration tests, vulnerability assessments, and audits. I have access to industry's best assessment tools and hold the CISSP, SANS GIAC GCIH, CEH, and more many certifications.
I have worked in the IT Security sector for the last 14 years, having specialized in the area of vulnerability management and security testing services, including: penetration testing, vulnerability assessments, security audits, risk assessments, etc. Having spent a considerable time of my carreer working in the Grand Duchy of Luxembourg - a country with strict security compliance requirements and regulations. I've had the opportunity to work for major financial institutions in Luxembourg and throughout Europe, but also for European and Luxembourgish government institutions, among others. Having worked with organizations where IT security is a critical concern has provided me with invaluable experience for problem solving and conflict management. I also gained the ability to work in a multinational and multilingual environment, with people of different backgrounds and cultures.
i am IS consultant and expert in Vulnerability Assessment and Penetration Testing. i give report for weekness of client website and tell how can secure website by Hackers.
Oranz Technology Solutions Pvt Ltd is a global IT security company functioning in INDIA, USA and UK with Head office Cochin. The company was formed from the merger of experts in the field of Web Application and Network Penetration Testing to create an independent, vendor neutral source of expertise. The company's expert professionals provide comprehensive security services that include Penetration Testing, Vulnerability Assessments, Cyber Forensic, ISO27001 consultation. The team also provides security policy development, security awareness training to corporate.
Helping small to medium sized companies with compliance: 1. Penetration Testing 2. Vulnerability Assessment 3. SOX Audit 2. Audit Preparation - IT audit co-source (IT general control, Application level controls) - Disaster recovery and contingency plan - Pre - implementation review and Post - implementation review (Project management) - SAS 70 review preparation - IT compliance Training - IT risk assessment - Policies and procedures other services includes: - Web application security testing
Over the last 5 years, I have performed various Penetration Testing and Vulnerability Assessments on different Web Applications & Networks for Corporations (Names cannot be disclosed as we are entitled to a Non-disclosure agreement). My core competency lies in performing black box. Web Application Security software im using during my research: BurpSuite. Penetration Testing programs im using during my research: BurpSuite, Nmap, Metasploit. Cracking Assessment: BurpSuite Web Server: IBM Websphere, IIS, Apache, Tomcat Apache, Glassfish Operating Systems: Linux, UNIX, Windows XP/7, Windows Server 2003/2008
I am EC-Council Certified Instructor(CEI),EC-Council Certified Ethical Hacker(CEH),a Cisco Certified Network Associate(CCNA) and Diploma in Information Security & Ethical Hacking(ISEH) with background of Bachelor of Engineering in Electronics & Telecommunications. I have 4+years of experience in the field of Ethical Hacking,Networking and Information Security.I have been a Consultant for Information security and a Trainer for CEHv7 & CEH v8 and ISEH. I have experience in Vulnerability assessment & Penetration testing(VAPT) and provide services for Website testing(Load/Stress/Application) Testing and I have completed projects for Corporate as well as Government clients.I have good knowledge about various VAPT tools including Kali Linux.
Blanket Security Services has over 18 years experience in information security, including: - Security Consulting - Security Architecture - Security Compliance - Vulnerability Assessment and Risk Management - Security Analysis and Engineering - Penetration Testing and Ethical Hacking Certifications include TOGAF 9.1, CISSP, CEH
Security experience of 3 years in following areas: Web Application/Network Penetration Testing Ethical Hacking Security Consulting Vulnerability Assessment of Network Devices/Databases/Web Server/Application Server Process and procedure documentation Ethical Hacking Training Pentesting Training I believe in Trust, Satisfaction and communication Attended SANS- GPEN training. -Network penetration testing and ethical hacking. Conducted security assessment of 40+ web applications and 50+ network security assessment.
Westside Virtual, Inc. leverages award-winning and highly respected Vulnerability Management technology to perform scan audits across your network devices, servers, web applications, databases and other assets in your environment.
Jonathon S. $30.00 / hr New to oDesk Jonathon S. IT Security Consultant Penetration Testing Network Security Vulnerability assessment Overview Certifications/Experience: I have 5 years of professional work experience in Cyber Security.I have certifications in/as Certified Ethical Hacker, Security+,FISMA/NISP compliance auditor,Business Continuity Planning, Risk Assessment(BIA), Incident Response,Security+,Python Scripting expert, and malware analysis. Hands on Experience: Web applications,Wordpress, Joomla, Drupal, Networking, Cisco, Linksys, Netgear, TP-Link, E-Commerce Security,Magento Forums - MyBB, phpBB,Firewall Management, Linux, Windows, etc. Experience utilizing Penetration testing tool: Manual SQL Injection Testing, Testing in-depth Penetration testing frameworks, Burp Suite, Metasploit and everything used in the Basic Kali Linux distro.
1. MS-Information Security 2. Experienced in Information Security Risk Management, servers &amp; network devices vulnerability assessment &amp; penetration testing (as per OSSTMM) along with OWASP based Application penetration testing. (5 years) 3. Experienced on Nmap, Nessus, OpenVAS, Retina, Paros, Acunetix etc. 4. Worked across multiple countries (UAE, Saudi, Singapore)
The world of IT is constantly evolving, driven by the needs of the business. With this evolution emerges the constant threat: Is your network safe? Adding a Vulnerability Assessment routine to your implementation strategies greatly improves your security posture, shoring up any misconfigurations, design flaws, application faults, and operating system vulnerabilities.
10 year of IT experience with over 6 years of IT Security experience along with Masters degree in Information Security from Concordia University, Canada with industrial certifications such as CRISC, GWAPT, SCJP, Green Belt in Six Sigma Methodologies and CISSP (in-progress). Specialize in Application, Mobile and Network Security. I enjoy engagements in the area of Application, Mobile and Infrastructure Security.
Firewall audits WordPress Security Plugins AntiVirus help Cybersecurity consulting Face it: cybercrime and hacking is an exploding pain point for anyone connected to the Internet. Whether you're a small/medium-sized business or an individual, your stakes are high in the fight against cybercrime. I am an Information Technology Professional and I can help you understand and implement ironclad IT security solutions for you or your business. I can help you navigate the complexities of PCI-DSS and HIPAA Compliance when it comes to computer and network security. I can zero in on security holes and give you actionable tips, techniques, and tools to make your WordPress website or Windows computer/network secure against hackers and malicious users. Industry recognized certifications include: CompTIA Security+ EC-Council Certified Ethical Hacker (CEH) WatchGuard Certified Security Professional (Firewall Administration) Microsoft Certified Professional
CEO Castelium , Security Firm specializing in PCI DSS and Audit Services.
DISC specializes in ISO27k framework and offers a wide array of solutions in information security and protection controls to meet industry security standards. we focus on delivering comprehensive solutions to businesses of all sizes in the area of information security and compliance. * Perform comprehensive security review/audit * Security strategic planning and security governance * Perform in-depth website application assessment * Review and revise security policies, and standards * Research on related information security topics * Evaluate qualifications for information security personnel * Design defense in depth securty architecture * Guide management in its selection of information security services and framework
We are a core group of Freelancers registered as 'Sheethal Group' and represented by me on this forum. Our goal is to provide great quality and end to end IT services and solutions to customers at very competitive prices. With an average work experience of close to 15 years, the team comprises of some of the best brains of the IT industry. I, the representative of the team, am a Computer Science Engineer from Manipal Institute of Technology with around 13 years of Industry Experience. Right blend of Technical and Business understanding, and a complete project team which guarantees efficient and effective project implementation is one of our greatest strengths. And this is something that cannot be provided by a freelancer alone, Working with us would be like working with a highly efficient company, but without the baggage of overhead costs, as in the case of a company. Here's your chance to have multiple brains work for you for the price of one!!!
infySEC is a rapidly growing security services organization,Our focus is on three areas: Client Security, Research & Development and building up intellectual capital with customers across Asia, US and Europe.InfySec is committed in providing an innovative set of services that address our clients. security needs. infySEC keeps focus on Research & Development, vulnerabilities Analysis ,tools development and few more services. infySEC is the trusted partner for managed risk and information security services to enterprises, and governments. It offers a comprehensive suite of services to identify and deal effectively with threats and risks related to information security management. These services include Managed Security Services, Technology Consulting Services, and Professional Security Services.
We find solutions to IT related problems. We specialize in Information Security. We have a vast background with Windows and Linux systems.
Certified Information Security Consultant [CISC] , Certified Web Application Security Professional [CWASP] , Certified Professional Forensics Analyst [CPFA] With the experience of over 6.5 years in Web Application and Network Penetration Testing I have worked on various projects related to Website Security, Penetration Testing and Network Security. My technical abilities span a very wide range of technologies across web applications, networks, operating systems, databases and web servers, however my specialization is Web Application security, Network Security and more Research and Developments
Recognized Expert in Risk Analysis, Cyber Security Policy, Assessment, Offensive Security and Operations. Providing a broad perspective on today?s global security challenges, tomorrow?s threats and a proven track record of innovative, effective solutions to government and private sector entities. Services & Achievements: ? Trained 5000 plus IT and Law Enforcement officials. ? Trained IB, Air force & State intelligence. ? Have involved in solving several cyber crime cases. ? Implemented forensics investigations for Govt and private bodies. ? Implemented VA/PT and Risk Management for several applications & networks ? Innovated technologies like secured email services, automated cyber security auditing tools, Insider Threat intelligence tool and Business & Threat intelligence tool. ? Won several awards for working on several cyber security research areas and National Security. ? Outstanding experience in risk, security and privacy management ? Familiarity with ISO Standards
I have completed my MBA with specialisation in Information Technology. I am EC-Council Certified Ethical Hacker v8 and have learnt Cisco's CCNA. I am seeking an opportunity to work and utilize my technical skill set in the field of Information Security, Computer Networking and Web Security. I look forward to work on any Information Security related work. I have done 2 months Internship as a part of my Master degree program and worked on the topic - ?A Study on Virtualization of Information Systems and IT Resources.? Apart from the IT Security field I have non-IT related work experience of 4+ years (working in my family business), where I have gathered the following skills - Logistics and Material Handling, Purchase and Inventory management, Tally Inventory and Accounts, Supervision and Personal Sales Presentation.
occupies a unique position in IT consulting with committed focus on both IT Infrastructure services & solutions. We are very much focused to deliver measurable IT value to the business during and after Business Transformation, with massively scalable ,flexible and reliable IT systems that can bring significant benefits to an enterprise, through reduced costs, improved service levels, and greater business agility.. Our approach is focused on bringing a Datacenter Service Transformation with Service integration between People, Process and Technology that ensures to bring in Business value. Our rich portfolio of service offerings across the infrastructure lifecycle that meet complete requirements of our customers: ? Advisory Service : To Assess & Advise ? Technology Service : To Design & Deploy ? Managed Services : To Operate & Report
Tate Hansen is a Principal and Managing Consultant at ClearNet Security, a boutique security consultancy based in Colorado that has been operating since 2004. Tate has professionally completed over 200 penetration tests, application security assessments, and vulnerability assessments in the last decade. He ranks as a top 5% contributor to the online Information Security Stack Exchange community and he has attended over 30 security conferences. Since early 2014 Tate has been a member of a large security team doing mobile, application, and network penetration testing for a multinational Fortune 10 corporation. In 2014 Tate discovered a high-risk vulnerability affecting Cisco routers that was credited to Tate and publicly announced by Cisco in November 2014 (CVE-2014-7992). Tate and his team are accepting new projects for 2015.
Information security consultant with 15 years of successfully designing, and auditing information security systems for financial institutions, corporations and government. Efficient at identifying information security and information technology risks, aligning them to business risk and coordinating remediation efforts. Proven ability to lead and direct at all levels of the organization. Effective team leader, continually empowering staff through training, guidance and motivation. Creative problem solver and strategic decision maker. Strong technical security assessments skills, including vulnerability assessment, web application assessment, social engineering, penetration testing, forensics and investigations, and security technical analysis skills. Specialties: Extensive experience in Information Security Risk assessment, IS Governance Implementation, IS Policies, IT risk management, Online Fraud Investigations, Electronic Fraud Investigations, SEIM integration, Vulnerability Mana
We provide services like Vulnerability Assessment (VA), Penetration Testing (PenTest), also provide support for Security softwares like Antivirus, Firewalls (Checkpoint), Operating System Security (Windows, Linux), Application Security (Web Application) and Patch management.
EXPERIENCE 19 years experience in Information Technology & Networking industry (from 1995) 16 years experience in IT Security industry (from 1998) 16 years experience in ???customer facing??? roles in sales, presales and consulting jobs (from 1998) 14 years experience within System Integration companies and Value Added Resellers (VARs) 11 years experience in presales, project management and IT consulting (from 2003) 11 years experience in relationship management both with technical and CxO contacts 11 years experience in penetration testing, vulnerability assessment and application-level audits 11 years experience in value proposition and consultative selling BACKGROUND Strong knowledge of IT Security, Networking and Unified Communication industries Strong understanding of security issues related to BYOD and new generation mobile devices Strong understanding of application-level attacks, social engineering and advanced malware (APTs) Strong understanding of malware and a
I have 10 years experience in penetration testing and vulnerability assessment. During this time, I've secured many custom platforms, CMS like WordPress, Joomla etc., maintaining many servers. My certifications include CEH/ECSA/CHFI/ and OSCP . I have deep understandings for all kind attacks like XSS, SQL Injections, BF, LFI, Session Hijacking etc. I can provide very advanced penetration testing, which is also a part of QA work. I will be pleased to assist you, by offering top-tier service, attractive prices, and a strong work ethic praised by my customers and envied by my competitors.
We are team of experience Software Developers and Penetration Testing consultants. We provide end to end support in complete project development life cycle. We have expertise in Web Development, Vulnerability assessment, Penetration testing, WAF implementation and consultancy, Web application Security, audit and compliance.
SERVER, HOSTING, IT SECURITY, AWS, CLOUD COMPUTING, VOIP, ASTERISK, VIRTUALIZATION QUAL - Master of Computer Applications (Post-Graduate) EXPERIENCE - - Sr. Manager in Hosting Company & ISP - 11 years of working with Linux Servers in Industry SKILLS * Linux Server Administration * AWS Cloud * Web/Mail/Domain Hosting * Hosting Panels - WHM/CPanel, Plesk, ISPConfig, Kloxo * LAMP, LEMP stack * Firewall, Proxy & Gateway level Security * Monitoring Servers & Network - NMS * Penetration Testing, Vulnerability Assessment * Security Auditing & Enforcement on Servers & Websites * VPN * HPC Clustering with Linux - OpenPBS, Torque, OpenMPI, OSCAR * Remote Server Support & Troubleshooting L2/L3/L4 * Virtualization - XEN, KVM * VOIP Asterisk Server, PBX - Vicidial, Elastix, Trixbox, FreePBX * Call Center Solutions * Load Balancing & High Availability * Tuning & Performance of Servers * Customization of Linux Kernel, Distro, Rebranding
I am a senior system and security administrator with over 10 years of experience. I have good knowledge of network security, ethical hacking, Penetration testing, server hardening. I performed penetration testing and vulnerability assessment of networks using backtrack5 r3 and Kali.Linux. I have done MCSE, CCNA and CCSP certifications.
An Independent Security Consultant that has been working with business to design and implement secure environments. Previous experience as System Administrator and Network Administrator provide me with an insight into how systems should work and the need to have a balance between security and usability. Passionate about Information Technology and the possibilities that it allows for, while also understanding the risks that threaten it. Working to ensure that business is able to grow through the benefit of technology while limiting risk caused by accidents or malicious actions. Currently on contract until June 14th, but available for after hours work or discussions about projects after that date.
I have 5+ years Exp., in Web-hosting Technologies and Security standards control implementations based on NIST standards, PCIDSS and ISMS. - Very good knowledge in setting-up servers from scratch - LAMP, AWS, Rackspace, DNS, IPABLES and CMS like WordPress, Joomla etc. - Security assessments like Vulnerability Assessment, Penetration Testing , Webapp and Mobile PT. - Apart from this, I hold certifications in RHCE, CEH, RSA Security Analytic, Cisco Datacenter and Vmware.
Over 6 years experience in network security devices, i can able to support firewalls (checkpoint,cisco ASA,Juniper srx, Fortigate,Sonicwall,Watchguard,linux firewalls) ,Anti spam (Cisco Ironport,barracuda,fortiMail,IMSS,etc),IPS/IDS(IBM ISS,Sourcefire,snort) and i have special skills in linux based servers and security projects. I am also having experience in information security services, i can able to do Vulnerability assessment,Penetration testing,web application security and Configuration audit. I am also holding the following certification GCIH (SANS) : GIAC Certified Incident Handler RHCE : Red Hat Certified Engineer FCNSP : Fortinet Certified Network Security Professional CCNA : Cisco Certified Network Associate WCSP :Watchguard Certified Systems Professional.
Paralok is one of India's leading and fastest growing information security consulting companies offering Network and Website Security. Our customers include many of the largest India Government Agencies as well as local and International banks and corporate. We work with both static and dynamic web sites, e-commerce, as well as big portals and well-known CMS systems such as Wordpress, Joomla and OpenCart. We also offer Mobile App Testing.
I have 16 + years experience within IT of which the last 5 have been dedicated to Information Security. I have conducted dozens of vulnerability assessments and penetration tests since 2010 for companies in a wide array of industries, mainly banking and healthcare. I currently manage a large Information Security program for a global advertising and marketing firm. I wear several hats in this role and my responsibilities are included, but not limited to the following: Incident Response and Forensics Vendor Management Vulnerability Assessments and Patch Management Network Penetration Testing / Web Application Penetration Testing Compliance Auditing (SOX/PCI/HIPAA) Information Security Consulting and Research
I am a Certified Ethical Hacker and security consultant. I help determine what needs to be fixed regarding systems and applications to ensure the integrity and security of federal information which is hosted in our system. I mainly perform web application assessments and tests. I build vulnerability reports at the end of my assessment of the application that help with remediation of any findings present. The reports are detailed with the findings and suggested corrective actions.
Experienced application and network security specialist, with many years experience in security consulting, research, vulnerability assessments, programming, project management, and engage in penetration testing.
I intend to establish myself as IT Security Analyst with an integrated business solution provider through a long time commitment through this i'am offering IT security which includes Web application pen-testing, penetration testing, vulnerability assessment , mobile application pen-testing, security auditing.
We are a team of 4 pentesters having 4+ years of experience and expertise in the following: 1. Web-application security testing 2. Internal/External network penetration testing 3. Vulnerability assessment of Hosts and networks 4. Configuration audit of popular devices. 5. Mobile application penetration testing. 6. Thick Client penetration testing. 7 Wi-Fi Penetration testing. 8. Firewall rule base audit We have been doing penetration testing professionally for the following clients: 1) Government/Private banks. 2) Big financial firms etc (Names cannot be disclosed as we are entitled to a Non-disclosure agreement).
Security experience of 1.5 years in following areas: Web Application/Network Penetration Testing Ethical Hacking Security Consulting Vulnerability Assessment of Databases/Web Server/Application Server. I believe in Trust, Satisfaction and communication Have also 1 year experience in Web Development and in Software Development. Listed in Hall of fame by helping their security : http://www.google.com/about/appsecurity/hall-of-fame/distinction/ https://www.facebook.com/whitehat/thanks/ http://technet.microsoft.com/en-us/security/cc308589 http://helpx.adobe.com/security/acknowledgements.html https://barracudalabs.com/research-resources/bug-bounty-program/bug-bounty-hall-of-fame-2/ http://nsn.com/responsible-disclosure https://www.eventbrite.com/walloffame/ http://www.constantcontact.com/security/report-vulnerability LinkedIn Profile: http://in.linkedin.com/pub/ashish-dhaduk/57/a24/268
I am a IT Professional with several Microsoft Certifications and EC-Council Certification in hand. In my career into IT and IT Security I have experience of 9+ years and I work around for Website and Web Application Audit, Windows Server Infrastructure design and support for organizations, design and support Hyper-V and System Center. Vulnerability assessment of a Network and devices is the job that I like most. I think every client deserve the best service.
Cybersecurity professional with background in network/system defense, certification & accreditation, vulnerability assessments, penetration testing, as well as professional training/instructing.
Having 3 year experience in the field of Information security with Post graduation in Cyber Law & Information Security.During my last 3 year professional tenure conducted 50+ penetration testing in Banking & Financial Sector.Expert in Network & Online Application Penetration Testing & Vulnerability Assessment.
Full-time UNIX/Linux administrator. Extensive experience of UNIX variants (Solaris x86 and SPARC, Tru64, AIX, HP-UX) and Linux (Red Hat & CentOS 5&6.x, Ubuntu, SLES & more) technologies; further experience of associated technologies and customisation thereof (Asterisk, Postfix, Nagios & custom plugins, OSSEC, LAMP stack & more.) Experienced in kernel reconfiguration, server hardening & associated security testing (black and whitebox pentesting etc.) Extensive experience of Windows Server 2003, 2008 and 2012 and Windows 7 & 8, and familiar with SCCM. Skilled in *NIX / Windows interoperability using Samba, CIFS, LDAP/AD integration via OpenLDAP & SASL passthrough etc. Practical experience of surveying customer network estate for vulnerabilities using Nessus and other industry standard tools & preparing documentation for different audiences (executive, technical etc.) Experience in using Puppet to control several hundred customer servers via custom modules with customised RPMs etc. Wor
I've experience penetration tester and vulnerability assessment. I also worked on openstack and Amazon cloud.
I have an extensive background in networking and network security. In addition to my technology background I also have an MBA which gives me the ability to have a strategic view of security and help your organization with solutions that are best for the business. - Over 16 years experience in the field - Worked with many Fortune 50 companies - Worked with multiple US Government agencies
As a Freelancer my skill is of Conducting Vulnerability Assessments and Penetration testing on Hosts as well on Web-applications. I work with positive attitude to produce better and more efficient results for the clients. I don't speak much better see me in action.
Security professional with extensive experience in areas such as Identity and Access Management framework and strategy reviews, ISO 27001 control framework, FFIEC, SoX ITGC controls, Cloud Security assessment, Vulnerability assessment, Controls testing, Data security and Data privacy.
i am a Information Security consultant, I have audited more than 100 Projects for Govt. and Private Organizations. working as Security Consultant to the organization. Working on Web application, Web Services Vulnerability Assessment and Penetration Testing.
We are an information security company based out of Bangalore. We are expertize in all kind of Application security Audits,Mobile Application Security,Vulnerability Assessments, Penetration Testing.
> Penetration Testing > Vulnerability Assessments > Malware Analysis and Removal > Security Assessments and Remediation > Computer Forensics > Security Incident Management > Firewall Auditing > Router Auditing > Threat Modelling #Freelance: Writing articles, Sound editing, Video editing > Technical Writing >Article/Blog/Web Content Writing >Internet Marketing >SEO Writing >Press Release >Product Reviews URL: http://ayanbhandari.blogspot.com/
I'm a Ethical Hacker. I'm expert in Vulnerability assessment & Penetration Testing.
Ethical Hacker, System & Network Engineer, Network & Web App Penetration Tester, Vulnerability Assessment & Penetration Testing Engineer, IT Security Specialist. ISO 27001
Specialties : Network Security, Web Application Penetration Testing, Infrastructure Security, Consultant, Bug Hunter, Hacking, Research & Development, Training People ??? Started my career in the field of Information Security when I was 16 years old ??? Worked with Assem Jakhar, Murtuja Bharmal, Akash Mahajan and some other well known India's Security Researchers ??? NULLCON cr3w member and organized Nullcon ??? 2014 @ Goa ??? NULL Dhramshala Chapter lead and regular speaker ??? Trained INDIAN NAVY & More than 8000 people in the field of Information Security & Ethical Hacking by various workshops and talks ??? I am Bug Hunter and wish had a luck in finding bugs in the topmost websites and services and products in the world and got appreciation ??? CVE-2014-4329, BID-66456, BID-66460 ??? Did Research in the field of Network & Infrastructure Security ??? Did Vulnerability Assessment & Penetration Testing for different clients ???
A career span of two + years on Network and Information security, vulnerability scanning, web application scanning, vulnerability assessment & penetration testing, Intrusion Detection and Prevention, firewall, encryption, operating system and application controls, policies and procedures, perform ethical hacking, malware reverse engineering
Eleven years of experience in vulnerability assessment, penetration testing and application security. Worked for worlds leading consulting and security companies.
I am a freelance penetration tester mainly focussing in web application vulnerability assessment,penetration testing security issues. Also I am experienced in network audit and mobile application testing. Also helping developers in mitigating the security issues. Practical experience with frameworks such as OWASP,WASC,SANS, OSSTMM ? Expertise in manual Web Application Penetration Testing ? Expertise in manual thick (Fat) client and thin client applications penetration testing and web services testing ? Expertise in Cloud penetration testing ? Expertise in Network Vulnerability Assessment ? Expertise in Mobile Vulnerability Assessment for Android ,iOS,Blackberry,Windows,Symbian applications ? Extensive experience in Internal and External Penetration Testing
Experience of Information Security in different domain, including Penetration Testing, Vulnerability Assessment, Web Security, Network Security, System Security domain. Woekd with domestic as well reputed internation client , successfully completed multiple projects in defined time limit with complete professional experience.
IT Risk Management & Benchmarking, Risk Assessment & management Security Audits, IT Audits and Application Security Assessments IT Security & Risk Management and Information Security Trainings Data Privacy and Protection. Vontu Data Loss & Prevention (DLP & Monitoring) ISACA Risk IT Framework, ISO 27001, CobIT, Governance, Risk and Compliance (GRC) Vulnerability Assessment & Management & Web Application Penetration Testing, Network Penetration Testing & Security Report writing IT Security Controls Reviews and Assurance, Source code reviews Incident Management and Reporting Risk Reviews, Compliance reviews and implementations of controls. Supplier Management (Vendor Management)
DokFLeed is an Internet Brand from the Leading Information Security Enterprise ISnSC. DokFLeed brand aims to provide the same quality of ISnSC security services but ONLY through the Internet. Consulting services cover, cryptography & PKI, Assessment, ISO27001, Pen-Testing, OS Hardening, Binary Analysis, Exploit Development, Reverse Engineering and Security Policies & Procedures. DokFLeed brand offers extensively skilled R&D team at discounted hourly rates.
Raju is Masters in Information Security who has conducted several PCI-DSS Gap Assessment, Risk Assessments, Remediation Support for various clients (Bank, BPO and Payment Gateways) across the world. Raju has performed several Vulnerability Assessment & Penetration Testing for Network and Applications.
IT Security expert with 2 years of professional experience in consulting, also holding a master's degree in Cyber Security from the University of York, UK. As a professional security consultant, my main goal is to provide a quality professional service and achieve full client satisfaction. I will not accept payment if I can't finish a task according to the client?s expectations.
I focus on virus removal, vulnerability assessments, penetration testing and system review. We also provide web application security reviews and consultation on cloud computing.
Masters from Purdue University USA, and has been working as a security consultant for past many years. Having CISSP and CEH, ECSA , CHFI. LPT. Extensive experience in Vulnerability Assessment, Web Application Security assessment, ISO 27001, PCI DSS, training etc. Pure play Information Security auditing firm with experience of SIEM, Penetration Testing, cyber forensics Auditing, Vulnerability Management, Delivering Audit reports to Big4 consulting firms like Deloitte , Ernst and Young as well as Fortune 500 companies etc - About the name Xiarch Xiarch, is an acronym for Xtreme InfoSec Auditors, Researchers, Consultants and Hackers. We have best of breed professionals in the infosec industry. Xiarch aspires to use its moral values, competence and knowledge to secure the corporate IT investments and help the our clients de-risk their business. Xiarch has its own R & D facilities, where cutting edge research is done in the field of information security.
I'm a highly professional IT Security Specialist having more than 5 years industrial experience.I specialize in Black Box/White Box Penetration Testing,Computer Forensics,Code Auditing and Ethical hacking. Academic and Professional Certification: MSc In IT Security & Computer Forensic Certified Ethical Hacker - CEH Computer Hacking Forensic Investigator -CHFI Certified Information Systems Security Professional - CISSP Certified Information Systems Auditor - CISA Brilliant understanding ,excellent command and practical exposure to : -OWASP TOP 10, SANS TOP 20, CWE, OSSTMM, ISSAF standards Vulnerability Analysis/Assessment & Pen-testing Box : -Kali Linux,BackTrack 5r3,Blackbuntu,BackBox, Metasploit Programming Languages: -Shell Scripting ,C,C++,C#,Perl,Python,Ruby on Rails,Visual Basic,Batch File. I have ability to work under pressure and meet deadlines.Client's satisfaction is my first priority.
Java Developer, Security Architect and Consultant.
Vulncheck specialized in delivering the extensive range of security services, helping our clients to ensure their systems and network integrity by conquering network defenses through rigorous testing. This comprehensive suite of security testing and assessment services provide a wide picture of potential vulnerabilities found in organization?s security infrastructure, system code, configuration, data management systems and business operations.
Have more than 6 years in computer security. I am certified in Computer Hacking Forensic Investigator (CHFI) and Computer Security Analyst (ECSA). I also have strong programming background in Visual Basic, PHP, and Python programming language. Experience handle huge system development and vulnerability assessment project on government and financial institution with more than 10000 users
My LinkedIn : https://www.linkedin.com/in/saifuddinamri Professional Penetration tester and security consultant with lot of experience in Vulnerability Assessments and Penetration Testing in Web Application, Network, Server and PCI-DSS. I'm providing consulting in several areas of security including penetration testing, application vulnerability assessments, network vulnerability assessments, and network and wireless security.
I have delivered many types of security solutions for companies such as Citrix Systems, BankUnited, Office Depot, Marex.com, City of Miami, Tracfone, AvMed, and Assurant. My technical knowledge spans Internet Security, Enterprise security architecture, design, encryption, operations, vulnerability assessment, regulatory compliance and audit. From 2001 to 2004, I cofounded the Honeynet Research Alliance and started the South Florida Honeynet Project, a non-profit organization dedicated to Honeynet Research. I coauthored the book Know Your Enemy: Learning about Security Threats (2nd Edition), and I have an extensive track record as a public speaker on topics surrounding intelligence gathering, event analysis, incident response and security awareness. I presented security awareness discussions for The Pentagon, West Point Military Academy, South Florida ISSA Chapter, FBI/InfraGard, Blackhat Las Vegas, Symantec and McAfee.
I specialize in Social Media Marketing,SEO , malware removal, web apps penetration testing, computer forensics, ethical hacking and Linux server security. Contact Me My FaceBook: https://www.facebook.com/ebinvthomas My Skype - ebinvthomas
Andres a Consultant with KPMG's IT Advisory Services practice in Chile. Andres has close to 7 years experience in the IT industry and has expertise in the area of IT security. Andres has worked on a large number of information securities advisory engagements involving network, host and application level security assessments and penetration testing. Andres has a strong background in network engineering. Prior to joining KPMG, Andres worked as a Project leader for Santiago team of the "Threat Management Solution" for a National Oil Company. Andres has worked on multiple international projects (ex. Uruguay, Venezuela, Peru) during his past employment and with KPMG and has been part of multi-cultural teams. Andres is confident and persuasive in presentation of both technical and business perspectives of information security.
To acquire knowledge in each and every vertical of IT security,passionate about IT security,never say die attitude,quick learning capabilities .
I am an independent information security professional, specializing in web and mobile application penetration testing and general information security consulting. I have over 11 years of experience working in information technology and security for both small start ups and large enterprises in a wide range of information security realms, most recently as an information security analyst at IBM in the Smarter Workforce division (formerly Kenexa).
Searcher of Knowledge, Student of Philosophy, Hacker, Drunkard and Occassional Poet.
Hi, My name is Leonid Kuznetsov. I have earned a Master's Degree in IT at the Moscow State University of Instrument Engineering and Computer Science. I clearly understand ITIL processes, clustering, HA systems, and how important is system monitoring. At the moment I'm working in the Lithuanian energy sector. My #1 goal will always be to meet your needs and deadline. When working on a new project, I like to speak with the client, so that I can have a clear understanding of his/her needs and vision of the project. I'm honest and fair.
I am working as a Systems Management Specialist, handling Hyper-V, Vmware, Windows Servers (All Flavors), Perform and remediate Vulnerability Scans.
I have been a Windows systems engineer, systems administrator, asp.net/asp and sql developer since 1998. I have experience in large hybrid enterprise environments providing architecture, implementation, maintenance, security assessment, incident response, and technical support. Experience configuring, supporting, and managing virtual infrastructure using VMware/ESXi/VIrtual Center and Hyperv/clustering/scvmm as well as supporting cloud architecture such AWS and Azure. I have also taught computer programming in the classroom and online. Most of my experience is in the public education sector and meeting the unique challenges faced by these types of organizations. The last several years has been focused specifically on Enterprise and Web application security.
IT specialists in all disciplines
Looking help provide a secure Information Technology environment. Have developed a program to help become PCI compliant. I also understand and can write C#, Python. Understand and am proficient in Kali Linux, WireShark, and other tools of the trade
Im currently an undergraduate with a local university and have participated in various Capture the Flag competitions (won a couple) and is very skilled in the area of pen test. Drop me a msg if your keen to engage my service !
I am an experienced consultant with over 10 years experience from solutioning and designing of enterprise solutions on Java/J2EE platforms to implementing software security solutions. My Speciality is identity management and attestation. I take pride in my work and always takes a positive approach to problem solving. If you have a challenging task, then i am your guy!
I am Web application security expert, I am an certified Information security consultant, I have audited more then 100 web application.
i'm a computer engineer, ethical hacker and security technician. good knowledge of kali linux and related tools/programs
IT Security, Ethical Hacking
C|CISO, CRISC, CISA, CISSP-ISSAP Specialties: Cyber Security
Information security professional having Master degree in information security, a CEHv8 certification and experienced in information security management.
CISSP since 2008 I possess extensive experience in all aspects of IA. I've been in the field of Computers since 1983. I'm currently training for the ISC2 CAP 2013 exam which includes the Revised NIST policies and guidance for Risk Management Framework procedures and process'. I've been involved in Certification and Accreditation process' for most of the last 19 years. I also have experience as a network administrator and with system maintenance and repair. Retired after 25 years from the US Naval Reserve in 2007.
I'm an experienced Information Security professional, certified in CISSP, OSCP, MCSE, MCSA, and MCDBA, I previously achieved CCNA, GCIH, passed CISM exam, and currently waiting for my 27001LA exam results, I have experience in projects associated with Data Centers, other IT infrastructure, IT Security, audit/compliance and/or risk management (especially PCI-DSS & ISO 27001). I have diversified area of expertise within Public Sector, Banking, Automotive, Ports and various industries.
An experienced Computer Forensics and Information Security Professional.
At the present time one of the aspects of great importance that allows the companies to remain competitive in the Internet is the security, which acts like catalyst in online businesses. Dynamics in the development, publication and changes in the computer science solutions can involve vulnerabilities that unauthorized people can take advantage for their own benefits, but affecting seriously your reputation and of your company. Don't allows the services and information you publish in Internet have weaknesses which can put in risk your reputation and of your company. A negligence position is just the attackers need to affect the integrity and availability of your site. All the companies are not conscious of the importance of the security for their business. Identify and evaluate the risks which your information can be exposed, doing this with regularity allows you to have a suitable monitoring of your infrastructure and safeguard your information.
Experienced professional with expertise in consulting Web application Vulnerability Assessment, Web Services Security, Network Security.
Web Designer with a 4+ year experience in CM systems such as WordPress, SharePoint and DotNetNuke (DNN). Excel in converting mockups/wireframes to funcional design, using vast amount of tools such as HTML5, CSS3 and jQuery. Broad and up-to-date knowledge on WordPress security. Good with handling and editing graphic design with Adobe PhotoShop. Responsible, puntal and will go above and beyond to help clients have a successfull website.
Smart thinker,quick to learn/adapt and good listener.