Description
keyboard_arrow_downSKILLS
Technical
Skills
and
Competencies
- Programming skills: Python, PowerShell, Ruby, JavaScript, Shell script, C#, (T-)SQL.
- System administrator level in Windows and UNIX-like operating systems.
- Practical knowledge in common penetration testing, vulnerability assessment, incident response, and IT forensics tools (including but not limited to Metasploit, Burp suite Pro, Nessus, Qualys, McAfee VM, Netsparker, nmap, Nikto, sqlmap, john, aircrack-ng, Redline, Kansa, FTK, Sleuthkit, Volatility, etc.).
- Practical knowledge in network and system security technologies (switches, routers, firewalls, proxies, VPNs, NIDS, SIEM, logging, antivirus, endpoint protection solutions, etc.).
- Experience with the following products: Trend Micro Deep Security, Trend Micro OfficeScan, Sophos UTM, Palo Alto Networks, FortiGate (FortiManager, FortiAnalyzer), Splunk, Security Onion (Snort, Suricata, Bro, Squil, Squert, ELK, ElastAlert), Elastic Stack (Beats, Elasticsearch, Logstash, Kibana), CISCO Sourcefire, Thycotic Secret Server.
- Practical knowledge of OWASP, OSSTMM, PTES frameworks and in ISO 27001.
Certifications, Licenses and Trainings
- GIAC/SANS: MGT305, GSEC (SEC401), SEC455, GCFE (FOR500), GCED (SEC501), GCIA (SEC503), GCIH (SEC504) GMON (SEC511), SEC524, DEV534, DEV540, SEC545, SEC546, GCDA (SEC555), GNFA (FOR572), GPYC (SEC573), GMOB (SEC575), SEC579.
- Offensive Security: OSCP, OSWP.
- Cloud Security Alliance: Certificate of Cloud Security Knowledge (CCSK).
- eLearnSecurity: eCPPT Gold, eMAPT, eNDP.
- EC-Council: Certified Ethical Hacker (CEH).
- SecurityTube/Pentester Academy: SecurityTube iOS Security Expert (SISE).
- Applied Net
Main Skills
keyboard_arrow_downOther Skills
keyboard_arrow_down PowerShell
Scripting
open source tools
IT Security
C#
antivirus
Kibana
Cloud Security
Python
CISCO
Windows
C/C++
Linux
Burp suite
Malware
Qualys
web application firewall
Ruby
OWASP
JavaScript
firewalls
VPNs
Shell script
cloud-based
Metasploit
automated testing
Elasticsearch
database
Programming
Progress OpenEdge
Nessus
AIX
Splunk
Snort
UNIX
routers
Information Security
Docker
proxies
nmap
Logstash
penetration testing
SIEM
McAfee
Amazon Web Services
Work & Experience
keyboard_arrow_downAttachments
keyboard_arrow_down