Certified Ethical Hacker (CEH)
Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.
Certified Ethical Hacker (CEH)
Certified Network Defender (CND)
- Certified Ethical Hacker (CEH)
- Certified Network Defender (CND)
- Certified Pentration Tester (CPEN) (in progress)
- Penetration Testing Methodologies
- Network and Application Security
- Tools and Technologies: Familiarity with commonly used penetration testing tools such as Burp Suite, Metasploit, Nmap, Wireshark, Python and Kali Linux
- Vulnerability Assessment: Ability to identify and assess vulnerabilities in web applications, networks, and operating systems
- Threat Modeling: Understanding of common attack vectors, risk assessment, and ability to provide recommendations for security enhancements
- Reporting and Documentation: Strong written and verbal communication skills to articulate findings and recommendations in clear and concise manner
- Implementation of endpoint protection tools and IAM management solutions
- Azure AD and Microsoft Defender XDR