Skills
• Ethical Hacking/Penetration testing: Footprinting and Reconnaissance, Scanning Networks and Enumeration, Vulnerability Analysis, System Hacking and Analyzing Malware Threats (IDA Pro), sniffing and social engineering, DOS, DDOS, Session Hijacking, Hacking Web Servers | web Applications | Wireless Networks and Mobile Platforms, SQL Injection, Evading IDS/IPS, Firewalls and Honeypots, IOT and OT Hacking, Cloud Computing, Cryptography and using more than 500+ attacking techniques and tools, example: (Nmap, Hping, Netcat, Nessus, OpenVAS, Vega, Nikito, Qualys Cloud Platform, GFI LanGuard, John the Ripper, Hashcat, Cain and Abel, Hydra, Metasploit, BeEF, Burp Suite, IDA Pro, Cyber Kill Chain, MITRE ATT&CK, OSINT, etc… ).
• Cyber Security: Wireshark, NetworkMiner, Diamond Model of Intrusion Analysis, Splunk, SIEM, EDR, IDS/IPS, Firewalls.
• Network protocols: TCP/IP, DHCP, DNS, VPN, VLAN, and OSPF, VPC, subnets and security groups,
• Virtualization: VMware and Oracle VirtualBox
• Python Ethical Hacking
• Ethical Hacking with ChatGPT
• SOC Analyst
• ISO 27001(ISMS)
• ISO 9001 (QMS)
About
Experienced Cyber Security Professional with a strong foundation in Penetration Testing, Network Security, and Application Security. Adept at leveraging diverse tools such as Nmap, Nessus, and Burp Suite to fortify systems aligned with OWASP standards. Proficient in managing robust firewall configurations, incident response using SIEM tools, and cloud computing within AWS environments. Holds certifications including Certified Ethical Hacker from EC-Council, ISO 27001, and excels in protocol management (TCP/IP, VPN) and virtualization (VMware, VirtualBox). Extensive expertise spans Cyber Security, Network Defense, and Secure Coding Practices.