Network Device Resume Profile
Key Qualifications
- 10 years managing sales problem solving customer service delivering the complete sales cycle
- Passion to study and determination to speak of data exploits strategy research.
- Knowledge of PCI, HIPAA, ISO, CobiT requirements, IIA and ISACA standards for auditing
- Knowledge of OWASP top 10 and CWE/SANS Top 25 classification remediation of attacks
- Familiar with developing proof-of-concept exploit for demonstrations
- Application Assessment including authentication mechanisms, SQL injection, fuzzing, parameter pollution.
- Knowledge of security tools: Nessus, Nexpose, Metasploit, WebInspect, Acunetix, Burp Suite, IDA Pro, Remnux, AppDetective, Core Impact, Retina, McAfee, Threat Guard, Microsoft Compliance Manager, Charles Proxy, Webscarab Proxy, Paros Proxy, SPAWAR SCC Tool, Qualys, Nmap, Cain, Hydra, Medusa, Kismet, soapUI, and John the Ripper.
- Disassemblers/Decompilers/Debuggers IDA Pro, OllyDbg, WinDbg, jad, flare/flasm, SoThink SWF Decompiler, Firebug, etc IDEs i.e. Visual Studio or Eclipse
- Excellent command of the English language Influential Attractive Entertaining Value Asset builder
- Non-smoker. Clean Cut. No Tattoos or Piercings. Able to lift and carry 100 lbs. above vertical avg
- Flexible open availability Relocatable competitive compensation considered
Notable Experience
Confidential
Ability to develop client needs analysis with valuable solutions.
Confidential
Modified existing information security policies, standards of procedures, physical system inventories, network and physical access mapping, logging capabilities including retention and secure maintenance, risk assessment practices, business continuity, cyber security risk management process standards, employee security training docs, data destruction
Confidential
- Experience performing Level I merchant assessments
- Advisory and remediation consulting Formal ROC report on compliance assessments
Confidential
Network Device assessment including configuration, firmware compliance, access controls formulating security roadmaps to bridge existing gaps
Confidential
Host Assessment including OS configuration check, access control, anti-virus, protocols and patch compliance. Security Information and Event Management SIEM Virtual Private Networks SSL, IPSec and Site-to-Site Middleware assessment including configuration, patch compliance and user rights.
Confidential
Strong planning and organization, execution.
Confidential
Math, Science, and English teaching
Confidential
Familiarity with Routers, Firewalls, IDS, PKI, VPN, Two Factor Authentication, Identity Management
Confidential
Top Salesman 5/'99. Full sales cycle training with up-sell initiatives.
