45344 days on xHamster
8572M profile views
56139K subscribers
72566 comments left

Hack validating windows

➢ Possess business acumen, technical abilities, and a keen sense of awareness of the industries.➢ Have excellent verbal and written communication, cross-functional project management, team building, and people development skills.• SOA Certified Professional • SOA certified Architect • IBM Certified SOA Solution Designer • Sun Certified Programmer for Java 2 • Microsoft Certified Developer (MSCD) • BEA Weblogic Integration Certificate • Siebel e Business Essential Training Certificate • web Methods B2Bi Certificate • Siebel EAI Training Certificate • web Methods Enterprise Certificate • web Methods Certified Manager Mr.➢ Have over twenty years of combined software/system development and management experience.➢ Substantial knowledge and experience in the following technologies and industries: Web Services, Service Oriented Architecture (SOA), Cloud Computing/Migration, Big Data, Hardware/Software Virtualization, XML gateway, Network appliances, Open-source development, Legacy System Modernization, XML, BPEL, Enterprise Service Bus (ESB), Information Assurance, Enterprise Application Integration (EAI), Business Intelligence (BI), ETL, B2B Integration, Enterprise Architecture, J2EE Application Server, Message-Oriented Middleware, Enterprise Resource Planning (ERP), Customer Resource Management (CRM), Supply Chain Management, Financial, Do D, and Intelligence Community.Network system engineering and operational skills: extensive experience in the full life cycle network development (routers, switches, and firewalls), network requirement analysis, architecture, design, drawing, specification, configuration, test, simulation, implementation, development, integration, operation, maintenance, system administration, system performance optimization, software and hardware troubleshooting, and product research and evaluation.Management and organizational skills: write winning proposals for federal government IT security contract solicitations, provide leadership, motivation, and direction to the staff, successfully managing day-to-day operations, tasks within schedule and budgetary constraints, responsible leader, manager, evaluator and decision-maker, thinking independently, identifying project scope, analyzing and solving complex problems, quickly learning and applying new methods, adapting well to changing environment, requirements and circumstances, excellent collaborating with corporate and government customers and technology stakeholders, excellent writing, oral, communication, negotiation, interviewing, and investigative skills, performing well in teams as well as independently, working effectively under pressure and stress, dealing successfully with critical deadlines, implementing activities identified in statements of work (SOW), detail orienting, managing team resources efficiently to ensure customer satisfaction and maximize team utilization and effectiveness (Information Resources Manager - IRM), utilizing time management, and project management methodology.

SOFTWARE, PROGRAMS, TOOLS, and OPERATING SYSTEMS: Penetration Testing tools: CORE Security CORE Impact (OS, web, and wireless modules), Rapid7 Metasploit Framework (with Armitage), Pro, and Express, Cobalt Strike, SAINT Corporation SAINTExploit, NGSSQuirre L for SQL/Oracle/Informix/DB2 database pentesting tools, Application Security App Detective Pro database pentesting tool, Offensive Security Back Track, Kali Linux, w3af, sqlmap, Havij, Portcullis Labs BSQL Hacker, SCRT Mini My Sqlat0r, NTOSQLInvider, Sql Injector.

Alternative to PENETRATION TESTER position names: Ethical Hacker, Application Penetration Tester, Red Team Lead, Application Security Consultant, Source Code Reviewer, Senior Information Systems (IS) Security Auditor, PCI Auditor, Security Advisor Engineer (SAE), Security Testing Engineer, Principal Security Subject Matter Expert (SME), Information Assurance Technical Analyst, Senior IT Security Analyst – SSDLC, System Security Architect.

Seeking Penetration Tester consulting position in a network security field with exposure to: penetration testing, manual and automated testing of: operating system, network, web application (DAST), source code (SAST), mobile devices, database, wireless, cloud, and social engineering (phishing).

including SAP, People Soft, Oracle, Siebel, Websphere, Weblogic, MQ-Series, MSMQ, JMS, REMEDY, TECHNOLOGIES AND STANDARDS EXPERIENCE, AXIS DWR, SSLAVA, JAAS, MS SQL, IBM RSM, IBM RDA, IBM WBM, TOGAF, CJIS IAFIS, BEA WLS, IBM RAD, Hadoop, HBase, JBoss, Spring, Hibernate, JPA, CXF, JSONLib, Ext JS, DOJO, JQuery, Prototype, My Faces, JIRA, WADL, JAX-B, WS-Addressing, WS-Metadata Exchange, UDDI, WS-Policy, MTOM, BPEL, BPMN, BPEL4People, SAML, XACML, WS-Security, WSRM, WS-Reliability, WS-Notification, WS-Eventing, WSDM, WS-RP, WMS, WFS, Jersey, Rest Easy, WSDP, WCF, Jboss WS, Mule, Service Mix, Datapower, XA35, Layer7, Reactivity, Cisco ACE, Kemp Load Master, web Methods, Oracle Fusion, Drools, JRule, DHTML, XHTML, XML, GML, KML, XSD, DTDs, DOM, SAX, St AX, XPath, XSL, XSLT, Nodejs, JSON, JSONlib, Sencha Ext-JS, JSP, JSF (ADF, Tomahawk, Openface), Facelets, Portlets, JBoss SEAM, WSRP, Spring MVC, HTML5, Shiboleth, RSA Cryptosystem, Phaos' SSLAVA, DB2, UDB, My SQL, Map Force, Stylus Studio, TOAD, UML, design patterns, Do DAF (C4ISR), NIEM, EBTS, NCIC, Nlets, NGI, Morpho Bis, Moropho Trak, Aware Nistpack, Enterprise Architecture, JTS/JTA, BEA Tuxedo, JBoss MQ, Oracle AQ, Active MQ, MQSeries, Intelli J, JDeveloper, Android Studio, Java, Groovy, Perl, Gradle, Maven, Ant, Anthill, Hudson, Jenkins, JUnit, JMock, DBUnit, Fiddler, HTTPWatch, Log Logic, Selenium, JLogger, Aspect J, EJB 3, Code Collaborator, Agitar, Find Bugs, HP Fortify, JMeter, C/C , IDL, WSDL, JAVAScript, VBScript, GNU compilers, Perforce, Subversion, GIT, IBM Clearcase, Dimension, Rally, Version One, ISO 9001, SPLUNK, Cloud Computing/Migration, Big Data, Hardware/Software Virtualization, XML gateway, Network appliances, Open-source development, Information Assurance, ETL, B2B Integration, Message-Oriented Middleware, Financial, Do D, cost effective, technical abilities, team building Mr. and provided consulting practices to both fortune 500 and large government system integrators.

Highlights of the Advanced Tran Tech's projects included: March, 1999 - July, 1999, Health Care Group, USI - Northrop Grumman, Inc., Chantilly, Virginia: Mr.

• Non-active OPM National Agency Check with Inquiry (NACI) security clearance (March 2003 - 2008). It previously resulted in winning government contract bids.

Please or register to post comments
If spammers comment on your content, only you can see and manage such comments Delete all

Hack validating windows introduction

Hack validating windows

Recent posts

30-Jun-2018 18:48
01-Jul-2018 04:46
01-Jul-2018 11:23
01-Jul-2018 17:36