Professional Penetration Tester, Security Consultant
Motivated and experienced technical and organisationalasa leader with 8 years of experience in government and the private sector
Strong communication, mentoring, and decision-making skills
- Recognized for implementing policy and process backed by technical credibility
- Certified penetration tester and ethical hacker; knowledgeable in numerous cyber security and information technology tools/protocols including but not limited to Snort, Wireshark, Nessus, Nmap, and others
Web Application/Network/Mobile Penetration Testing
Wordpress/Joomla Security and Malware Analysis/Removal
Ethical Hacking
Security Consulting
iPhone/Android/Blackberry/J2ME Mobile Security Testing
Security Code Review (.NET, JAVA, PHP)
Vulnerability Assessment of Network Devices/Databases/Web Server/Application Server
Wireless Security
Website/server infected with MALWARES or HACKED removal
-
Web Server Security
Assessment of susceptibility to Cross Site Scripting, SQL Injection and Buffer Overflow Vulnerabilities inline with the OWASP framework. In line with a strict code of conduct, and the rules of engagement agreed upfront with yourself, I will simulate the actions of a malicious and determined hacker. Using a proven methodology I will asses your web app for the above vulnerabilities as well as those laid out in the OWASP top 10 2017.
Fully knowledge of CWE top 25 most dangerous software errors on application's.
Provide full secure with easy concepts & able to understand everyone.
Tools using -- NMAP, Burpsuite, Nessus, Wireshark, Acunetix,W3af, xsser, nmap,nikto,grabber,matalsploit attacks, website redirecting
The output of this assessment will provide you with a peer review report highlighting the following;
1. Discovered Vulnerabilities
2. Explanation of discovery and exploit path
3. Remediation actions
4. Security best practice
5. Technical References
1. Open Source Analysis / Footprinting
Conduct reconnaissance using open source information. Analysis of Google entries, relevant websites and available metadata in order to enumerate Usernames, Staff Email Addresses and company IP's which can be used.
Work Terms
My project delivery will be ontime and grab heart of my client through my work.