Foto sampul profil
Sekarang Anda mengikuti
Kesalahan mengikuti pengguna.
Pengguna ini tidak mengizinkan pengguna mengikuti dia.
Anda sudah mengikuti pengguna ini.
Paket keanggotaan Anda hanya boleh punya 0 follow. Tingkatkan di sini.
Berhasil berhenti mengikuti
Kesalahan mengikuti pengguna.
Anda telah berhasil merekomendasikan
Kesalahan merekomendasikan pengguna.
Ada sesuatu yang salah. Silakan muat ulang halaman dan coba lagi.
Email berhasil diverifikasi.
Avatar Pengguna
$30 USD / jam
Bendera INDIA
kollam, india
$30 USD / jam
Saat ini 1:50 PM di sini
Bergabung Mei 19, 2014
0 Rekomendasi

John M.

@jhnmthw94

monthly-level-three.svg
verified-v2.svg
5,0 (1 ulasan)
1,0
1,0
67%
67%
$30 USD / jam
Bendera INDIA
kollam, india
$30 USD / jam
100%
Pekerjaan Selesai
100%
Sesuai Anggaran
100%
Tepat Waktu
N/A
Tingkat Rekrut Ulang

Cybersecurity Architect & Certified Ethical Hacker

Certified Ethical Hacker that possesses thorough knowledge and broad expertise in the security and technology spaces. Uses my background to create and maintain boundaries around network devices and computer systems, protecting them from attacks. Will always take proactive role in the architecture, design, implementation and support of security focused resources to ensure safe operations. As a Cyber Security Professional , I work towards securing the Cyberspace and preserving the security and integrity of my client's data. My career experience and skills have evolved over time from my childhood hobbies with computers and software, to being mentored and trained in active exploitation techniques because of my curious personality. I have a Bachelor's Degree focused in Computer Science and Engineering from Cochin University of Science and Technology and began my career as Quality Assurance Engineer specializing in Non Functional Requirements Testing where I came in contact with Penetration Testing. Moved on to a full fledged Cyber Security role engaging myself in: * Web Application Penetration Testing, * Secure Source Code Analysis, * Network Penetration Testing, * Malware Analysis and Reverse Engineering. Experienced Ethical Hacker equipped with the knowledge of a wide array of toolsets at my disposal because Security is a myth and Testing is inevitable.

Hubungi John M. mengenai pekerjaan Anda

Login untuk mendiskusikan hal-hal detail melalui kotak obrolan.

Portofolio

11803813
11803809
11803803
11803813
11803809
11803803

Ulasan

Perubahan tersimpan
Menampilkan 1 - 1 dari 1 ulasan
Filter ulasan menurut:
5,0
$30,00 USD
Delivered Raspberry Pi weather .img and it works well.
Microcontroller
Arduino
Coding
Raspberry Pi
P
Bendera Ana M.
@paxamoris
27 hari yang lalu

Pengalaman

Cybersecurity Architect

In Time Tec
Okt 2018 - Sekarang
● Leading the Cybersecurity team and its efforts to protect organization cyberspace. ● Penetration testing Web Applications, Mobile Applications and Network devices. ● Plan and implement Cybersecurity solutions. ● Lead Cybersecurity Incident response efforts. ● Developing, updating security policies, procedures and standards. ● Monitor the complete network and to ensure protection against external threats or attacks ● Malware containment and eradication

Edukasi

B. Tech Computer Science and Engineering

Cochin University of Science and Technology, India 2012 - 2016
(4 tahun)

Kualifikasi

Certified in Cybersecurity

ISC2
2023
The vendor-neutral CC credential starts newcomers on their path to advanced cybersecurity certifications and future leadership roles. It proves to organizations that newly certified team members understand fundamental security principles and operations, network security and access controls and that they have the skills to meet and exceed performance standards in their beginning roles. All this allows organizations to build a stronger line of defense.

Certified Ethical Hacker

EC-Council
2019
Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.

Hubungi John M. mengenai pekerjaan Anda

Login untuk mendiskusikan hal-hal detail melalui kotak obrolan.

Verifikasi

Freelancer Pilihan
Identitas Terverifikasi
Pembayaran Terverifikasi
Telepon Terverifikasi
Email Terverifikasi
Terhubung Facebook

Sertifikasi

preferredfreelancer-1.png Preferred Freelancer Program SLA 1 93%
freelancer_orientation.png Freelancer Orientation 1 90%
us_eng_1.png US English 1 75%
Pengguna Sebelumnya Pengguna Berikutnya
Undangan berhasil dikirim!
Terima kasih! Kami telah mengirim Anda email untuk mengklaim kredit gratis Anda.
Anda sesuatu yang salah saat mengirimkan Anda email. Silakan coba lagi.
Pengguna Terdaftar Total Pekerjaan Terpasang
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Memuat pratinjau
Izin diberikan untuk Geolokasi.
Sesi login Anda telah kedaluwarsa dan Anda sudah keluar. Silakan login kembali.