Banner Image

Skills

  • Cyber Defense
  • Data Security
  • Forensic Consulting
  • Fraud Analysis
  • Internet Investigations
  • IT Audit
  • Penetration Testing
  • Security
  • Security Audit
  • Vulnerability Assessment
  • Web Security

Services

  • Cyber security expert - 20yrs experience

    $12/hr Starting at $25 Ongoing

    Dedicated Resource

    Ethical grey and black-box web application, internal and external infrastructure penetration tests, audits and exploitation. Have conducted numerous tests for government and blue chip companies. Operating...

    Cyber DefenseData SecurityForensic ConsultingFraud AnalysisInternet Investigations

About

Experienced security consultant, with an extensive background in penetration testing, security reviews and threat assessment. Excellent research and data analysis skills.

Expertise in the following:
• Ethical grey and black-box web application, internal and external infrastructure penetration tests, audits and exploitation, both remotely and on client sites.
• Operating system build (configuration) reviews, including mainframes.
• Firewall and router security reviews.
• Intrusion analysis.
• Threat intelligence and assessment
• Vulnerability assessments.
• Evidence gathering and investigations using internet and device forensic techniques, including log and network packet analysis.
• PCI/ISO 2007 standards
• Social engineering.
• Report proofreading.
• Ascertain security issues in new business projects throughout their lifecycle.
• Red-team work.
• Cloud service security testing.
• Scoping client engagements; excellent client communication both during and after a job.
• Gathering information and evidence on intellectual property infringements, including original source and supply chain diversions, manufacturers and distributors.
• Conducting extensive online research and monitoring of illicit activity. Finding information using advanced non-invasive techniques, including data leakage of sensitive information from public sources such as forums, social media, chat rooms, paste and underground sites.
• Tracing individuals and the source of network, email and internet activity.
• Managing and delivering projects on time and to budget.

Work Terms

Can work at any time/day. Strive to meet deadlines and produce high-quality work. Reports of findings will generally contain a summary, detailed findings, references to further reading and conclusions.