We provide IT Staff Augmentation Services!

Network Device Resume Profile

5.00/5 (Submit Your Rating)

Key Qualifications

  • 10 years managing sales problem solving customer service delivering the complete sales cycle
  • Passion to study and determination to speak of data exploits strategy research.
  • Knowledge of PCI, HIPAA, ISO, CobiT requirements, IIA and ISACA standards for auditing
  • Knowledge of OWASP top 10 and CWE/SANS Top 25 classification remediation of attacks
  • Familiar with developing proof-of-concept exploit for demonstrations
  • Application Assessment including authentication mechanisms, SQL injection, fuzzing, parameter pollution.
  • Knowledge of security tools: Nessus, Nexpose, Metasploit, WebInspect, Acunetix, Burp Suite, IDA Pro, Remnux, AppDetective, Core Impact, Retina, McAfee, Threat Guard, Microsoft Compliance Manager, Charles Proxy, Webscarab Proxy, Paros Proxy, SPAWAR SCC Tool, Qualys, Nmap, Cain, Hydra, Medusa, Kismet, soapUI, and John the Ripper.
  • Disassemblers/Decompilers/Debuggers IDA Pro, OllyDbg, WinDbg, jad, flare/flasm, SoThink SWF Decompiler, Firebug, etc IDEs i.e. Visual Studio or Eclipse
  • Excellent command of the English language Influential Attractive Entertaining Value Asset builder
  • Non-smoker. Clean Cut. No Tattoos or Piercings. Able to lift and carry 100 lbs. above vertical avg
  • Flexible open availability Relocatable competitive compensation considered

Notable Experience

Confidential

Ability to develop client needs analysis with valuable solutions.

Confidential

Modified existing information security policies, standards of procedures, physical system inventories, network and physical access mapping, logging capabilities including retention and secure maintenance, risk assessment practices, business continuity, cyber security risk management process standards, employee security training docs, data destruction

Confidential

  • Experience performing Level I merchant assessments
  • Advisory and remediation consulting Formal ROC report on compliance assessments

Confidential

Network Device assessment including configuration, firmware compliance, access controls formulating security roadmaps to bridge existing gaps

Confidential

Host Assessment including OS configuration check, access control, anti-virus, protocols and patch compliance. Security Information and Event Management SIEM Virtual Private Networks SSL, IPSec and Site-to-Site Middleware assessment including configuration, patch compliance and user rights.

Confidential

Strong planning and organization, execution.

Confidential

Math, Science, and English teaching

Confidential

Familiarity with Routers, Firewalls, IDS, PKI, VPN, Two Factor Authentication, Identity Management

Confidential

Top Salesman 5/'99. Full sales cycle training with up-sell initiatives.

We'd love your feedback!