Qualified Information Security Professional with over 5 years of technical experience. Currently provide services as an Cyber Security Consultant. I hold a Master of Science Degree in Information Security and Certified Ethical Hacker (CEH) certification. Most recently assisting companies with audit readiness to include: SOC2, ISO 27001, GDPR, NIST-CSF and related efforts to ensure compliance readiness. Besides that, I improve my skills in ICT areas, especially in information security, and regularly conduct and participate in security related training, seminars etc. I would love to share direct work, but under the law, I am not able to make the penetration test reports or vulnerability assessments available to the public it is against the ethics, so I cannot add them to my portfolio. It would be an honor to work with you and help you find your best cyber security solution. Thank you.
Add work experience to your profile. (optional)
Successfully defined IT security policies and procedures to support IT function.
Conducted gap analysis of existing IT infrastructure with respect to ISO/IEC 27001 to assess existing security infrastructure.
Conducted Risk Assessment and defined prevention strategies through Risk Treatment Plan.
Ensured adherence to IT Architecture principles and guidelines along with published Information Security Standard (ISS)
(CIS Benchmark).
Identified and Reported vulnerabilities of CISCO network devices using Nipper, Cisco Audit Tool and Kali Linux.
Perform discovery and vulnerability scans on networks and validate findings through penetration testing.
Enhanced End-Point Security by developing Kaspersky endpoint security solution.
Periodically reviewed and updated documentation of the firewall environment to ensure accuracy.
Configured McAfee Vulnerability Manager 3100 and conducted Vulnerability Assessment for IT services hosted in the data
center. Monitored and analyzed resources such as OSSIM, Splunk; data feeds of alerts and logs from firewalls, routers, and
other network devices or hosts; and data feeds and/or alerts from CISCO IPS, and other host and network-based IDS/IPS to
watch for security violations and determine vulnerabilities.
Assisted with the development, maintenance of, and training on technical documentation and Standard Operating
Procedures (SOP). Specified application security testing requirements to be included within the CICD/SDLC testing
frameworks
Add work certification to your profile. (optional)
Add work education to your profile. (optional)
By using this site, you agree to our Privacy Policy and Terms and Conditions
Web Design and Management by VisiOne Design
© 2018 - Freelance Security, All rights reserved.
We will review the reports from both freelancer and employer to give the best decision. It will take 3-5 business days for reviewing after receiving two reports.