Hack validating windows
➢ Possess business acumen, technical abilities, and a keen sense of awareness of the industries.➢ Have excellent verbal and written communication, cross-functional project management, team building, and people development skills.• SOA Certified Professional • SOA certified Architect • IBM Certified SOA Solution Designer • Sun Certified Programmer for Java 2 • Microsoft Certified Developer (MSCD) • BEA Weblogic Integration Certificate • Siebel e Business Essential Training Certificate • web Methods B2Bi Certificate • Siebel EAI Training Certificate • web Methods Enterprise Certificate • web Methods Certified Manager Mr.➢ Have over twenty years of combined software/system development and management experience.➢ Substantial knowledge and experience in the following technologies and industries: Web Services, Service Oriented Architecture (SOA), Cloud Computing/Migration, Big Data, Hardware/Software Virtualization, XML gateway, Network appliances, Open-source development, Legacy System Modernization, XML, BPEL, Enterprise Service Bus (ESB), Information Assurance, Enterprise Application Integration (EAI), Business Intelligence (BI), ETL, B2B Integration, Enterprise Architecture, J2EE Application Server, Message-Oriented Middleware, Enterprise Resource Planning (ERP), Customer Resource Management (CRM), Supply Chain Management, Financial, Do D, and Intelligence Community.Network system engineering and operational skills: extensive experience in the full life cycle network development (routers, switches, and firewalls), network requirement analysis, architecture, design, drawing, specification, configuration, test, simulation, implementation, development, integration, operation, maintenance, system administration, system performance optimization, software and hardware troubleshooting, and product research and evaluation.Management and organizational skills: write winning proposals for federal government IT security contract solicitations, provide leadership, motivation, and direction to the staff, successfully managing day-to-day operations, tasks within schedule and budgetary constraints, responsible leader, manager, evaluator and decision-maker, thinking independently, identifying project scope, analyzing and solving complex problems, quickly learning and applying new methods, adapting well to changing environment, requirements and circumstances, excellent collaborating with corporate and government customers and technology stakeholders, excellent writing, oral, communication, negotiation, interviewing, and investigative skills, performing well in teams as well as independently, working effectively under pressure and stress, dealing successfully with critical deadlines, implementing activities identified in statements of work (SOW), detail orienting, managing team resources efficiently to ensure customer satisfaction and maximize team utilization and effectiveness (Information Resources Manager - IRM), utilizing time management, and project management methodology.
SOFTWARE, PROGRAMS, TOOLS, and OPERATING SYSTEMS: Penetration Testing tools: CORE Security CORE Impact (OS, web, and wireless modules), Rapid7 Metasploit Framework (with Armitage), Pro, and Express, Cobalt Strike, SAINT Corporation SAINTExploit, NGSSQuirre L for SQL/Oracle/Informix/DB2 database pentesting tools, Application Security App Detective Pro database pentesting tool, Offensive Security Back Track, Kali Linux, w3af, sqlmap, Havij, Portcullis Labs BSQL Hacker, SCRT Mini My Sqlat0r, NTOSQLInvider, Sql Injector.
Alternative to PENETRATION TESTER position names: Ethical Hacker, Application Penetration Tester, Red Team Lead, Application Security Consultant, Source Code Reviewer, Senior Information Systems (IS) Security Auditor, PCI Auditor, Security Advisor Engineer (SAE), Security Testing Engineer, Principal Security Subject Matter Expert (SME), Information Assurance Technical Analyst, Senior IT Security Analyst – SSDLC, System Security Architect.
Seeking Penetration Tester consulting position in a network security field with exposure to: penetration testing, manual and automated testing of: operating system, network, web application (DAST), source code (SAST), mobile devices, database, wireless, cloud, and social engineering (phishing).
Highlights of the Advanced Tran Tech's projects included: March, 1999 - July, 1999, Health Care Group, USI - Northrop Grumman, Inc., Chantilly, Virginia: Mr.
• Non-active OPM National Agency Check with Inquiry (NACI) security clearance (March 2003 - 2008). It previously resulted in winning government contract bids.