Inspiring Governance, Risk and Compliance professional well-versed in policy development, and reporting. Well-organized and systematic with excellent communication and planning abilities. Looking for challenging position in fast-paced environment.
Vulnerability Management
Google IT Support Specialist
2021 - present Top 8% on famous hacking platform Try Hack Me
. I've ran penetration testing engagements with the help of kali linux, and metasploit database.
. Exploited windows machines with the famous MS17_010 exploit resulting in a meterpreter session on remote host.
.Ran web application penetration test using burp suite. Exploited several apps using bruteforcing sniper tool, and static code analysis.
. Performed network analysis using nmap, and masscan to map out my target's infrastructure and establish a strong, and well devised attack vector.
.performed clean up and post exploitation tools to cover tracks.
. Authored a report explaining step by step how I was able to enumerate the target, perform vulnerability analysis and research, establish an attack vector, and break into the target system. In a fashion, that could be replicated by anyone.
2021 - present Ethical Hacking with Python
. Learned python programming, with Zaid from Z security, established a full comprehension of python, and programming basics.
. Learned how to create algorithms to solve large scale problems, by break down of problems, and providing efficient solutions.
. wrote an arp spoofer, that can be used to trick systems on a network by falsifying arp request.
. wrote a packet tracer similar to tcp dump
. learned about the scapy library and its power.
EJPT in Progress
Quayls Vulnerability Management, Detection and Response
Quayls End Point, Detection and Response
CPE-ITA (PCI DSS) Subject Matter Expert
Google IT Support Specialist