Banner Image

Skills

  • Computer Repair
  • Networking
  • Penetration Testing
  • Training

Services

  • Information & Cyber Security Analyst

    $25/hr Starting at $25 Ongoing

    Dedicated Resource

    I have 18 years of experience in the IT industry.  My educational experience is a bachelors in Information Technology and a masters in Information Security. I have expertise in Windows Operating Systems,...

    Computer RepairNetworkingPenetration TestingTraining

About

I am an Information/Cyber Security Analyst, Penetration Tester, Ethical Hacker.

I have 18 years of experience in the IT industry. My educational experience is a bachelor’s in information technology from the University of Central Florida, and a master’s in information security from Southern New Hampshire University. I have expertise in Windows Operating Systems, repair and install computer hardware and software, printer issues, as well as Wi-Fi. I'm a cyber security professional that knows how to protect information, perform penetration testing, install, and update security software, draft Information Assurance Plans, teach employees about security threats, and work with other IT professionals. I worked as Network Security Administrator for 6 years, for one of the largest granite fabricators in the state of Florida.

The services I provide are Penetration Testing, Vulnerability Scans, Draft Corporate Information Assurance Plan - includes user policies and training, ethical guidelines, network security policies, incident response policies, and disaster response policies. I also recommend software, hardware, or procedures to provide network safeguards.

Work Terms

I do face to face, or remote consultations during normal business hours Monday through Saturday. I provide a one time/periodically service for an hourly rate, or a monthly service agreement option.

For penetration testing, I humbly ask for a consent form to be signed before any testing is done. Once testing is done, you will receive a detail report of my findings that will include: snapshoots, summary, the severity, and explanations on how to patch or mitigate found vulnerabilities.