•Experience with Linux networking configuration, administration, BASH scripting task automation. •Performed SSH server configurations with asymmetric key authentication for multiple users. •Knowledge of virtualized technology, such as VMware and docker, server hosting and basic configuration. •Usage of and modification of publicly available exploits to audit systems using enumeration and reconnaissance techniques. •Ability to learn fast and apply critical thinking to projects without any prior knowledge of the subject. •Experience with multiple tools Kali Linux such as Metasploit, Nmap, Dirbuster and other security-oriented distros to perform security auditing and compliance testing Experience with CISCO entry-level device configuration such as routers and switches. •Troubleshooting computers and servers using a methodological approach standard by Odesie •Able to search publicly available sources to understand new concepts/resolve problems. •Understanding terminology and jargon that pertains to the information technology field. •Experience with 32-bit ELF reverse engineering and buffer overflow using Mona, GDB, Python and immunity debugger.