|Professionally trained in vulnerability, risk analysis, and production quality management. Highly proficient in the development of security protocol and implementation. Cross-platform proficiency in Windows, UNIX, and Linux. Advanced knowledge of security and ethical hacking applications, tools, methodologies and best practices (including Kali Linux, Wireshark, Pen Testing, Risk Assessment and Management).|
Companies Worked For:
Job Titles Held:
© 2019, Bold Limited. All rights reserved.