Cybersecurity professional with a strong interest in ethical hacking, penetration testing. Preform systems scans, implement planning, researching and development of security policies, standards and procedures. Maintains a detailed inventory of all equipment used on the network and documents the existence of proper licenses for all software.