Israel Guzman, Cybersecurity Architect and Threat Intelligence Lead Developer in Bogotá - Bogota, Colombia
Israel Guzman

Cybersecurity Architect and Threat Intelligence Lead Developer in Bogotá - Bogota, Colombia

Member since October 5, 2015
Isra is a cybersecurity architect and threat intelligence lead with 13+ years of experience and 18+ years of IT experience. His expertise includes incident response; SOC; PCI DSS; DevSecOps; CI/CD automation; bug bounty and malware hunting; mixed box vulnerability assessments with PTES, OSSTMM, OWASP, OSINT, NIST, and MITRE; capture the flag (CTF); vulnerability management solutions (VMS); and ethical hacking. As a cybersecurity expert, Isra also consults, trains, mentors, and speaks at events.
Israel is now available for hire

Portfolio

  • Palo IT
    Agile, Automation, AWS, Scrum, Cybersecurity, DevSecOps, Banking & Finance...
  • SkyVirt
    Cybersecurity, Threat Intelligence, SoC, IoC, SIEM, IDS/IPS...
  • Zaga Labs
    Cybersecurity, Threat Intelligence, Zero-day Vulnerabilities, SoC...

Experience

  • Digital Forensics 20 years
  • Ethical Hacking 13 years
  • Cybersecurity 13 years
  • Zero-day Vulnerabilities 3 years
  • SoC 3 years
  • IDS/IPS 3 years
  • Threat Intelligence 3 years
  • SIEM 3 years

Location

Bogotá - Bogota, Colombia

Availability

Full-time

Preferred Environment

Cybersecurity, Threat Intelligence, IDS/IPS, Zero-day Vulnerabilities, Incident Response, Blockchain, Architecture, Innovation, Bug Triage, IT Security

The most amazing...

...Bug Bounty Hunter awards I received were Top 25 and Hall of Fame in 2018 by AT&T, then winning hackathons with the HackerOne platform as "akax."

Employment

  • DevSecOps Consultant

    2021 - PRESENT
    Palo IT
    • Centralized identity management and assigned permissions transversally.
    • Configured VPN to segregate access individually and gather traffic logs.
    • Automated CI/CD pipelines to deploy QA and ephemeral staging environments.
    • Identified customer transactions that used more infrastructure and reduced the DevSecOps workload.
    • Deployed a CDN and high availability in specific zones.
    • Automated vulnerability analysis for infrastructure and applications and prevented a sensitive data leak.
    • Recommended code reviews and automated testing solutions.
    • Created vulnerability management solutions (VMs) capable of integrating with any third party in the industry to provide an all-in-one solution with a unique dashboard.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Agile, Automation, AWS, Scrum, Cybersecurity, DevSecOps, Banking & Finance, Web App Security, Web Security, HIPAA Compliance
  • Board Member | USA and LAC

    2020 - PRESENT
    SkyVirt
    • Wrote the following eight modules of Cyber Range, based on the MITRE ATT&CK Framework, while working in a freelance capacity.
    • Started with the basics: DevSecOps; AutoDevSecOps, WSL2, SIEM, Kubernetes, and Docker; OSINT and Enumeration; BugBounty; Capture the Flag Competitions (CTFs); SQL Injection (SQLi); Cross-site Scripting (XSS); and DDoS.
    • Designed the model for the 10 new modules listed below for ethical hacking, based on the MITRE ATT&CK Framework.
    • Sniffing; ARP cache poisoning, MITM, network traffic analysis, network traffic encryption; brute force attack and countermeasures; email spoofing and phishing and IP spoofing with DOS and countermeasures; Trojan; backdoor, virus, and countermeasures.
    • Continued: bypassing proxy and countermeasures; SQLi and countermeasures; code injection attack and countermeasures; broken authentication and countermeasures; privilege escalation and countermeasures; and buffer overflow and countermeasures.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, Threat Intelligence, SoC, IoC, SIEM, IDS/IPS, Incident Response, Splunk, Rapid7, Maltego, Digital Forensics, Ethical Hacking, Zero-day Vulnerabilities, Blockchain, Web App Security, Web Security, Distributed Ledgers, HIPAA Compliance, Self-sovereign Identity (SSI), FERPA Compliance
  • Chief Information Security Officer

    2019 - PRESENT
    Zaga Labs
    • Implemented a secure data center with IP security while serving as a freelance external advisor.
    • Installed pfSense firewall security, OpenVPN, and site-to-site VPN.
    • Ensured that security measures protected perimeters and rejected attackers.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, Threat Intelligence, Zero-day Vulnerabilities, SoC, Web App Security, Web Security, HIPAA Compliance
  • Security Researcher | Bug Bounty Hunter | Hacker101 Capture the Flag (CTF) Player

    2018 - PRESENT
    HackerOne
    • Received two honors from HackerOne and AT&T (2018 and 2019). Earned 13 invitations and 3/26 points toward my next private program invitation.
    • https://ctf.hacker101.com. https://hackerone.com/akax/.
    • https://hackerone.com/att/thanks/2018. https://hackerone.com/akax/year-in-review.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, Threat Intelligence, SoC, IoC, SIEM, IDS/IPS, Incident Response, Splunk, Rapid7, Maltego, Digital Forensics, Ethical Hacking, Zero-day Vulnerabilities, Web App Security, Web Security, Distributed Ledgers, HIPAA Compliance, Self-sovereign Identity (SSI), FERPA Compliance
  • Chief Information Security Officer

    2015 - PRESENT
    Katharsis
    • Implemented a secure data center while working in a freelance capacity.
    • Installed a Cisco firewall for IP security, VPN, and site-to-site VPN.
    • Protected devices and networks with Sophos security solutions.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, Web App Security, Web Security
  • Founder

    2008 - PRESENT
    TI
    • Provided a full range of cybersecurity services: research, threat intelligence, monitoring and cyber surveillance of national critical information infrastructure (NCII), network protection, penetration testing, and ethical hacking.
    • Consulted on forensic investigation, bug bounty, DevSecOps, cloud computing, blockchain, machine learning, and AI. Provided support and training.
    • Delivered training programs: Creating Disruptive Differentiation with Innovation Management; The fundamentals Cybersecurity and IT Security; Cybersecurity and Secure IT Infrastructure, from Policies to Technology and IT Operations.
    • Became an IT Geek Trusted Advisor and delivered courses for the chief information security officer (CISO).
    • Spoke on Gartner's Nexus of Forces, describing how the convergence and mutual strengthening of social media, mobility, cloud computing, and information patterns are creating new business opportunities.
    • Leveraged areas of expertise to advise clients: security, ethical hacking, and cybersecurity; web application security, network security, and application security; ransomware and malware; DeepWeb, DarkNet, ZeroNet, ZeroDay, and Exploit.
    • Provided risk advisory services to the open web application security project (OWASP).
    • Advised clients on cloud security and a law enforcement agency on cybercrime and cyber investigation.
    • Served as an active member in the information security community of the current cyberspace.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, Threat Intelligence, SIEM, IDS/IPS, Incident Response, Splunk, Rapid7, Maltego, Digital Forensics, Ethical Hacking, Zero-day Vulnerabilities, SoC, IoC, Web App Security, Web Security, HIPAA Compliance, Self-sovereign Identity (SSI), FERPA Compliance
  • IT Operations and Security Supervisor

    2020 - 2021
    Visa
    • Provided the knowledge required to follow and adhere to PCI DSS compliance frameworks and helped to obtain the SOC Level 2 certification, following the security requirements and standards.
    • Used a wide range of tools, including SumLogic, Qualys, Mandiant, SolarWinds, Falco, mobile financial banking; PCI RoC/SOC2 Type II; CloudFlare, Sumo Logic; Mandiant, Qualys, DefectDojo, Check Point, Check Point CloudGuard, Dome9, and SilverSky.
    • Identified systemic security issues based on the analysis of vulnerability and configuration data. Enabled the organization to reduce risks and achieve regulatory and statutory compliance.
    • Implemented security measures to resolve vulnerabilities, mitigate risks, and recommend security changes to systems or system components as needed.
    • Collaborated with functional and cross-functional teams and stakeholders to identify and/or develop appropriate solution designs, implementation, and required mitigation strategies.
    • Managed multiple technologies for mobile financial banking and chaos engineering with Chaos Toolkit and Istio.
    • Used a wide range of technologies: Snyck, Dependabot, Sonatype DepShield; Trend Micro, Symantec, Sophos; Google Cloud GCP; K8S and Falco as a Daemon; and Sonarqube (dependency checks).
    • Splunk; Jira and Trello; Veracode, Trustwave, Detectify, Mesh7, and Qualys; ProGuard, DexGuard, iXGuard; Bitbucket and Concourse; and DigiCert Central.
    • Grafana Loki and Data Studio; MongoDB and MySQL; HAProxy and APIs; Gauntlt and Ruby for Vulnerability; and vulnerability management systems (VMS).
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, DevSecOps, Mobile Banking, PCI, SOC 2 Type 2, Cloudflare, Sumo Logic, Mandiant, QualysGuard, DefectDojo, Dome9, Check Point CloudGuard, Istio, Mobile App Development, Kubernetes, Cloud Security, Security, Threat Intelligence, SoC, IoC, SIEM, IDS/IPS, Incident Response, Splunk, Rapid7, Maltego, Digital Forensics, Zero-day Vulnerabilities, Web App Security, Web Security, HIPAA Compliance
  • Chief Information Security Officer

    2020 - 2020
    Vycton
    • Protected the University Foundation of the Andean Area while working as an external, freelance advisor.
    • Implemented several Kaspersky Cybersecurity solutions.
    • Implemented IBM Tivoli Storage Manager with data loss protection (DLP).
    • Implemented Lenovo XClarity to protect the storage.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, Web App Security, Web Security
  • DevSecOps Senior

    2020 - 2020
    FortifID
    • Played a key role (as a contractor) in a DevSecOps and CloudUnit project for a US Silicon Valley-based customer. This involved working with SSN data providers, Equifax, Neustar, and Grain.
    • Conducted black-box penetration testing and achieved SOC 2 certification.
    • Implemented AutoDevOps CI/CD, using GitLab Gold and Kubernetes.
    • Developed solutions for managing personally identifiable information (PII) and sensitive data protection. The technologies used included AWS, Rapid7, Qualys, OpenVAS, Maltego, Burp Suite, and other penetration testing tools.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, DevSecOps, GitLab, AWS, QualysGuard, OpenVAS, Burp Suite, Penetration Testing, Kubernetes, Cloud Security, Security, Threat Intelligence, SoC, IoC, SIEM, IDS/IPS, Incident Response, Splunk, Digital Forensics, Ethical Hacking, Zero-day Vulnerabilities, Web App Security, Web Security, Distributed Ledgers, HIPAA Compliance, Self-sovereign Identity (SSI), FERPA Compliance
  • Cloud Senior Engineer

    2018 - 2020
    Globant
    • Designed and deployed futurist projects related to information security for a wide range of companies (shown below). Prioritized and assigned tasks to a group of cybersecurity leaders.
    • Implemented the Great Minds eLearning platform for Core Digital Systems (CDS), using Terraform, Ansible, and GitHub Actions over AWS.
    • Developed a digital banking mobile app for iOS and Android for GNB Sudameris Bank.
    • Co-developed solutions as a member of the EY core platform squad. These included the EY Blockchain Analyzer, Axiomatics, and others related to common capabilities and tax transparency.
    • Designed the architecture and deployed, supported, maintained, protected, and secured the environments.
    • Served as a cybersecurity advisor to C-level executives, stakeholders, and product owners who made decisions about solutions that addressed business goals and risks.
    • Advised leadership, management, and less experienced cybersecurity leaders on solutions deployed in the environment for incidence responses related to threats, vulnerabilities, and compliance. Used Agile, Scrum, and Jira to address and track issues.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, Terraform, Ansible, AWS, Mobile App Development, iOS, Android, Security Architecture, Agile, Scrum, Jira, Kubernetes, Azure, Cloud Security, Amazon Web Services (AWS), Security, Threat Intelligence, SoC, IoC, SIEM, IDS/IPS, Incident Response, Splunk, Rapid7, Maltego, Digital Forensics, Ethical Hacking, Zero-day Vulnerabilities, Blockchain, Web App Security, Web Security, Distributed Ledgers, HIPAA Compliance, Self-sovereign Identity (SSI), FERPA Compliance
  • Virtualization & Migration Engineer

    2018 - 2018
    Claro Colombia
    • Led discovery and the RFP process to migrate VMware to Huawei Private Cloud FusionSphere for Global HITSS.
    • Migrated HP ServiceManager Cloud BMC Remedy (Apache Tomcat), protected by security baselines, Qualys, Dynatrace, and SIEM.
    • Implemented a chatbot offered by the Inbenta company.
    • Managed operating systems: Oracle Solaris, Oracle RACDB, Red Hat, and Windows Server.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cloud, Cloud Security, Security, Web App Security, Web Security
  • Cloud Architect

    2017 - 2017
    BITS Americas S.A.S
    • Migrated a 100% on-premise infrastructure to Azure for Flores Funza, while serving as the CISO at BITS Americas.
    • Migrated to Office 365 for Flores Funza and Tannus, a legal services company.
    • Set up an AWS ETL for Tigo Latam, a Millicom telecom company.
    • Managed operating systems: Windows Server and Linux.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, Web App Security, Web Security
  • Chief Information Security Officer

    2013 - 2016
    Bull Marketing
    • Implemented a secure data center while working as a freelancer.
    • Supported VPN, site-to-site VPN, IP security, and VoIP, using Asterisk.
    • Protected a secure website and email communication to prevent virus infections by bad actors.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity, Web App Security, Web Security
  • Security & SysAdmin SME

    2012 - 2016
    Hewlett Packard Enterprise
    • Served as a capability administrator L4 for Pfizer, overseeing the ITO project delivery team, application hosting services (AHS) reporting group, and Intel on physical and virtual environments with VMware and Hyper-V.
    • Owned responsibility for building and securing existing and new systems according to lifecycle capacity, always focusing on business continuity with emphasis on finding the root cause and proper solutions for each daily case.
    • Oversaw premium support for 400 servers, aligned with the overall infrastructure, ensuring that IT assets met the needs of corporate policies and continuously building strong professional relationships with key IT and LOB executives.
    • Served as a subject matter expert for a Latam internal assessment review (ITAM), corrective action and preventive action (CAPA), and problem and root cause analysis (RCA).
    • Led ITSM change management 401 RFCs; conducted 12 pre-approved template reviews; and provided service incident management with response 2755 resolved and 1863 requested. Served as a configuration item owner and QA of 400 CIs, under CMDB.
    • Set up monthly BTI and daily infrastructure operations and amp reports for regional operative meetings with the global command center (GCC).
    • Managed hardware self-sparing and product support case management. As an HPE Saba learner and HPE support case manager, completed Power 2 Learn (126 courses) and learned manager and admin rooster roles.
    • Authored and approved answers for the knowledge base support analyst portal. Led cross-functional teams through the entire SDLC.
    • Performed security monitoring and analytics, using HPE Service Center, Qualys, Nessus, MSB, SCCM, McAfee ePolicy Orchestrator 5.3 Intel Security, EMC Watch4Net, CA SysEdge, and eHealth. Merged three data centers into one.
    • Managed the infrastructure: HPE servers, storage, Cisco switches, networking, blades, and backup solutions, HP Data Protector and CA BrightStor ARCserve. The technologies were VMware, Linux ESx, Aix, HP-UX, Red Hat, and Windows Server.
    Technologies: Cybersecurity, Web App Security, Web Security
  • Chief Information Security Officer

    2010 - 2014
    InTacto Comunicaciones
    • Served as an external freelance advisor to InTacto Comunicaciones.
    • Implemented a secure communication channel for the whole company, using Microsoft Exchange.
    • Deployed Symantec cybersecurity solutions to protect the network and devices.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity
  • Chief Information Security Officer

    2010 - 2013
    Construcciones Obycon SAS
    • Protected the network and devices with Kaspersky cybersecurity solutions.
    • Enforced policies to prevent unauthorized access to the company's applications.
    • Implemented Active Directory with GPO, using a Microsoft Windows Server.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity
  • SysAdmin

    2010 - 2012
    SONDA
    • Supported servers for 3M: HP ProLiant G7; HP EVA4400; HP MSL6000; Dell PowerEdge; AD; DHCP; DNS; GPO, SQL, Visual Studio Foundation; file, SharePoint, and IIS Servers; and SCCM.
    • Implemented a new data center and DRP, covering VMWare, Lotus Domino 8, CA ARCserve, and HP Data Protector.
    • Managed service requests from IBM TEC and the Remedy Helpdesk; supervised the dashboard server and PC support.
    • Provided specialized support to VIP users, covering MOC Apple and BlackBerry.
    • Supported deployment (Swimage) and McAfee Encryption. Provided regional level-one support, both onsite and remote.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity
  • Chief Information Security Officer

    2008 - 2011
    Geosintéticos
    • Implemented a secure way to manage all the IT devices while working as an external freelance advisor.
    • Deployed a secure PHP web portal with a MySQL database.
    • Implemented a secure communication channel for the whole company.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity
  • SysAdmin

    2007 - 2010
    IBM
    • Provided cybersecurity services for Avianca and Allianz.
    • Served as a command center engineer, working with VMware, HP Data Protector, and BrightStor ARCserve, as well as change management.
    • Provided tech support for Active Directory, Forefront, File Server, IIS, WSUS Updates and Cirats, Exchange 2007, Blackberry BES, Citrix high availability in multiple data centers, and accounting closes.
    • Ensured enforcement and control of interfaces in SAP, IIS, SQL, Adabas, SIS, Sharepoint, Test Director and ESM, Oracle, AIX, Hp-Ux, Tivoli TEC, HP Data Protector and Tivoli TSM, VIP and the company's CNCs. Provided 7x24 second-level support.
    • Managed operating systems: HP-UX- Aix, Oracle Solaris, Red Hat, and Windows Server.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity
  • IT Specialist

    2005 - 2006
    Getronics
    • Worked in the IT department at Movistar (https://www.movistar.co/).
    • Monitored data centers, Citrix clusters, and applications.
    • Provided VIP support at a national level for Gtran devices and cellular data services.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity
  • IT Analyst

    2002 - 2005
    Sitel Group
    • Completed work for internal clients: Microsoft, Telecom, and HP.
    • Supported network and communication solutions at a national level.
    • Provided support and training for services, such as VSAT, Clear Channel, and satellite connections.
    • Created the intranet in PHP for internal management of those client companies.
    • Led cross-functional teams through the entire SDLC.
    Technologies: Cybersecurity

Experience

  • Spyder Analytics
    https://github.com/4k4xs4pH1r3

    Automated cybersecurity CI/CD pipelines with multiple command-line arguments and customized with CyberScan ninja techniques that can perform a wide range of security tests and discovery functions, taking precedence over any configuration. It's important for those who are serious about network scanning to know about these pipelines. This research focused on identifying the maximum batch mix mode supported by Sypder Analytics.

    The proof of concept included the following functions:
    • Comprehensive OS guesses.
    • Uptime, ports, and service device types per host detection based on fingerprint matches.
    • Vulnerabilities discovery based on network traceroutes and service versions on each port.
    • Host footprinting based on TCP/IP sequence prediction and thumbprint over IPv4 and IPv6.
    • Firewall and IDS evasion and spoofing with accurate miscellaneous options.

  • Startup Founder

    Founded in 2008, TI Corporation provides a full range of cybersecurity, artificial intelligence, and related services: Research, threat intelligence, cybersecurity and surveillance for national critical information infrastructure protection, forensic investigation, network protection, penetration testing, ethical hacking, black box projects, bug bounty hunters, DevSecOps CI/CD, cloud computing, blockchain, AI, machine learning, and IT support and training.

  • Cyber Range | Author of Training at SkyVirt
    https://cyberrange.skyvirt.tech/

    Wrote eight training modules dedicated to Cyber Range while serving as a board member for the USA and the Latin America and the Caribbean (LAC) and an external freelance advisor to Cyber Range.

    Basic Modules:
    • DevSecOps
    • AutoDevSecOps + WSL2 + SIEM + Kubernetes + Docker
    • Osint and Enumeration
    • BugBounty
    • Capture the Flag Competitions (CTFs)
    • SQL Injection
    • Cross-site Scripting (XSS)
    • DDoS

Skills

  • Paradigms

    DevSecOps, Automation, Penetration Testing, Agile, Scrum, HIPAA Compliance
  • Industry Expertise

    Cybersecurity, Security, Banking & Finance, IT Security
  • Other

    Software Development Lifecycle (SDLC), Ethical Hacking, Growth Hacking, Culture Hacking, Web App Security, Web Security, CI/CD Pipelines, Digital Forensics, Cloud Security, Threat Intelligence, SoC, IoC, SIEM, IDS/IPS, Zero-day Vulnerabilities, Incident Response, APIs, Serverless, Cloud, IOTA, Bug Triage, Computer Science, Networking, Quantum Computing, IT Project Management, Mobile Banking, PCI, SOC 2 Type 2, Cloudflare, Mandiant, DefectDojo, Check Point CloudGuard, AWS, Rapid7, Maltego, Troubleshooting, Programming, Mobile App Development, Security Architecture, English, English Language and Literature, General, English as a Second Language, Indicator of Compromise (IOC), Cloud Computing, VSAT, Dedicated Channels, Clear Channel, Frame Relay, Peer-to-peer Networking, Architecture, Innovation, Distributed Ledgers, FERPA Compliance, Self-sovereign Identity (SSI)
  • Tools

    Splunk, Sumo Logic, Dome9, GitLab, Terraform, Ansible, Istio, Jira
  • Platforms

    Azure, Amazon Web Services (AWS), Kubernetes, QualysGuard, Burp Suite, iOS, Android, Windows Server, Blockchain
  • Languages

    Python, Ruby, PHP, Java
  • Frameworks

    OpenVAS
  • Storage

    Databases

Education

  • Bachelor's Degree in Computer Science
    2001 - 2003
    ECCI University - Bogotá, Colombia

Certifications

  • Web Security: Same-Origin Policies
    JULY 2020 - PRESENT
    LinkedIn
  • Web Security: OAuth and OpenID Connect
    JULY 2020 - PRESENT
    LinkedIn
  • Transitioning to a Career in Cybersecurity
    JULY 2020 - PRESENT
    LinkedIn
  • Sophos Certified Sales Consultant
    JULY 2020 - PRESENT
    Sophos
  • Project 2019 and Project Online Professional Essential Training
    JULY 2020 - PRESENT
    LinkedIn
  • Penetration Testing: Advanced Web Testing
    JULY 2020 - PRESENT
    LinkedIn
  • Penetration Testing: Advanced Enumeration
    JULY 2020 - PRESENT
    LinkedIn
  • OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
    JULY 2020 - PRESENT
    LinkedIn
  • Microsoft Cybersecurity Stack: Advanced Identity and Endpoint Protection
    JULY 2020 - PRESENT
    LinkedIn
  • Learning Tor and the Dark Web
    JULY 2020 - PRESENT
    LinkedIn
  • Learning Cyber Incident Response and Digital Forensics
    JULY 2020 - PRESENT
    LinkedIn
  • Introduction to Quantum Computing
    JULY 2020 - PRESENT
    LinkedIn
  • Insights from a Cybersecurity Professional
    JULY 2020 - PRESENT
    LinkedIn
  • Extending, Securing, and Dockerizing Spring Boot Microservices
    JULY 2020 - PRESENT
    LinkedIn
  • Ethical Hacking: The Complete Malware Analysis Process
    JULY 2020 - PRESENT
    LinkedIn
  • Ethical Hacking: Penetration Testing
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA PenTest+ (PT0-001): 5 Selecting Pen Testing Tools
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA IT Fundamentals (FC0-U61) Cert Prep 3
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA IT Fundamentals (FC0-U61) Cert Prep 2: Files and Applications, Networking, and Security
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA CySA+ (CS0-002) Cert Prep: 7 Compliance and Assessment
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA CySA+ (CS0-002) Cert Prep: 4 Software and Systems Security
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA CySA+ (CS0-002) Cert Prep: 2 Vulnerability Management
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA CySA+ (CS0-002) Cert Prep: 1 Threat Management
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA A+ (220-1002) Cert Prep 6: Networking, Security, and More
    JULY 2020 - PRESENT
    LinkedIn
  • CompTIA A+ (220-1002) Cert Prep 4: Command-Line Interface and Scripting Languages
    JULY 2020 - PRESENT
    LinkedIn
  • CISSP Review Course Completion Certificate ISC²
    JULY 2020 - PRESENT
    ISC2
  • CISSP Cert Prep: 8 Software Development Security
    JULY 2020 - PRESENT
    LinkedIn
  • CISA Cert Prep: The Basics
    JULY 2020 - PRESENT
    LinkedIn
  • CISA Cert Prep: 1 Auditing Information Systems for IS Auditors
    JULY 2020 - PRESENT
    LinkedIn
  • CASP+ Cert Prep: 4 Technical Integration of Enterprise Security
    JULY 2020 - PRESENT
    LinkedIn
  • CASP+ Cert Prep: 3 Enterprise Security Operations
    JULY 2020 - PRESENT
    LinkedIn
  • Android App Penetration Testing
    JULY 2020 - PRESENT
    LinkedIn
  • AWS for DevOps: Security, Governance, and Validation
    JULY 2020 - PRESENT
    LinkedIn
  • AWS for Architects: Advanced Security
    JULY 2020 - PRESENT
    LinkedIn
  • AWS Security Best Practices for Developers
    JULY 2020 - PRESENT
    LinkedIn
  • Aviatrix Certified Engineer (ACE): Multi-Cloud Network Associate Course
    JULY 2020 - JULY 2023
    Aviatrix
  • Google Cloud Platform Fundamentals: Core Infrastructure
    JUNE 2020 - PRESENT
    Coursera
  • Senior Cyber Security Engineer
    DECEMBER 2019 - PRESENT
    Udemy
  • Level BBB | CEFR LEVEL B2
    DECEMBER 2019 - PRESENT
    Language Market
  • Advanced Computer Security | Strategic Decision and Risk Management
    JANUARY 2016 - PRESENT
    Stanford University Online
  • Level BBB | CEFR LEVEL B1
    DECEMBER 2015 - PRESENT
    Berlitz Languages Inc.
  • MCSA: Windows Server 2012 R2
    DECEMBER 2014 - PRESENT
    Microsoft
  • IT Professional
    DECEMBER 2012 - PRESENT
    Microsoft
  • MCITP | Windows Server 2008 R2 (70-640)
    DECEMBER 2012 - PRESENT
    Microsoft
  • Network Analyst
    DECEMBER 2006 - PRESENT
    Sitel University
  • English Intermediate
    DECEMBER 2004 - PRESENT
    KOE Corporation

To view more profiles

Join Toptal
Share it with others