This Resume Has Not Been Formatted
Integral Leader skilled in Penetration Testing, Vulnerability Assessments, Network Protocols, Data Analysis, Risk Mitigation / Management, Process Improvements / Recommendations, and Stakeholder Relations, and can work to lead Training / Development of PT peers, as well as key globally based clients.
Top Performer who exhibits expertise in ethical hacking processes with web applications, Androids, mobile applications, desktop applications, live databases, reverse engineering, virtualized infrastructures; technologies; and systems (Solaris, Windows, HP-UX); as well as OWASP and OSSTMM methodologies.
Excellent Communicator who builds and sustains synergistic relationships with internationally based management, IT / operational peers, and clients, and can demonstrate strong written / verbal communication and negotiation skills while working autonomously or collaboratively to meet objectives.
Ambitious Self-Starter who offers proven experience in IT operations optimization in alignment with a company s vision, value, and goals, and leads peers by example and with integrity to deliver excellence.
Launched Attacks / Analysis ￨ Database Penetration Testing
Web Application Penetration Testing (SQL Code, Injection, XXS
Cookies-Based Injection, RFI, LFI, Burp Suite, Temper Data, Acunetix)
Mobile Device Smartphones (iOS, Android, Windows, Blackberry, Android Studio)
Run Android Emulator ￨ Scanned for Vulnerabilities (Nmap, Nessus, Nikto, Qualys, Retina)
Wireless Penetration ￨ Code Review ￨ Reverse Engineering ￨ Social Engineering ￨ Physical Assessments
Bachelor of Science in Computing (Ongoing) Anglia Ruskin University, Cambridge, UK
OND ￨ HND Computer Engineering Kwara State Polytechnic, Nigeria
Certified Ethical Hacking (No. ECC94482175885)
Offensive Security Certified Professional (OSCP)
Certified Computer Hacking Forensic Investigator
Project Management (BCS) ￨ ISO / IEC 27001 Lead Auditor
Net Consulting (2014 2015)
Penetration Test Analyst
Utilized broad scope of industry knowledge toward directing forward-thinking penetration testing using Core MetaSploit MaltegoSploit to detect vulnerability and testing web applications for OWASP s Top 10 threats injection flaws (e.g. SQL, OS, XSS, broken authorization, session management, sensitive data exposure).
Capitalized on the opportunity to perform solutions-focused vulnerability testing on wireless devices with External USB Adapter Antenna Network (Alfa High Power Cards) - WiFi vulnerability, as well as maximizing use of resources to achieve objectives by overseeing and conducting detailed vulnerability assessments.
Directed testing of Android applications for basic Malware threats, as well as cross-site request forgeries.
Developed and documented critical security evaluation test plans and procedures.
Prepared and distributed comprehensive security assessment reports for customers.
Yyyyyy x. yyyyyy ￨ Page Two ￨ 0000 xxxxxx xxxx , xxxx , xxxxx 000003
Aqua Tech Solutions (2013 2014)
Penetration Test Analyst
Strategically steered penetration testing of web applications, conducted network penetration testing on web applications, performed web application security reviews and source code security analysis for internal clients, and performed vulnerability detection by identifying various vulnerabilities posing a high risk to key business.
Liaised among business stakeholders for remediation of vulnerabilities to improve security posture and increase attack resiliency, and initiated repeat testing to improve defenses and lower likelihood of attacks.
Reviewed security architecture specs and modeled real world threats against the architecture.
Trained developers and / or system administrators on secure code and remediation processes.
Hacking Teacher.com (2012 2013)
Played a vital role in supporting a large-scale telecommunications company in performing daily penetration testing of network and web applications, including performing systems and network information assurance analyses via expert penetration techniques within a fast-paced and highly technical environment.
Delivered high-quality technical engineering services for complex integrated security systems and solutions.
Led client-driven strategic processes to translate security and business requirements to technical designs.
Conducted audits to ensure systems were secure and policies / procedures were followed.
Designed and developed unique integrated security solutions for data / systems protection.
Successfully trained other Penetration Testers based in Dubai, along with developing and delivering training workshops with clients based in Africa and Asia via Skype and Teamviewer.
Professional Computer College, Liverpool, UK (2007 2010)
Delivered lectures to students on CompTIA Network+ and Security+, including instructing individuals on management and troubleshooting of basic network infrastructure; installing, operating, and configuring wired and wireless networks; identifying common networking protocols and ports; identifying and troubleshooting performance and connectivity issues; and installing and configuring network devices.
Led targeted instruction on topics ranging from cryptography; threats and vulnerabilities; and application, data, and host security to compliance and operational security, access control, and identity management.
Discussed the latest network testing tools to achieve objectives.
Described networking technologies and basic network design principles.
Nigeria National Petroleum Company (NNPC) (2006 2007)
Effectively established network specifications by conferring with users, including analyzing workflow, access, information, and security requirements, as well as handling interfacing configuration and routing.
Evaluated network performance issues, including availability, utilization, throughput, goodput, and latency, and further planned and executing equipment selection, installation, configuration, and testing.
Optimized network performance by handling network monitoring and analysis and performance tuning.
Consistently maintained a secure, confidential environment to protect the company.
Proactively troubleshot network challenges, and escalated problems to various vendors.
Defined network policies and procedures, and worked to establish connections and firewalls.
Secured networks by developing access, and handled control, evaluation, and documentation.
Excellent Professional References Provided Upon Request
Remember: Hire Us To Write YOUR New Resume
And We GUARANTEE That If You’re Not Working In 60 Days Or Less,
We’ll Revise Your Resume, Refund Your Money,
AND Give You $50 EXTRA!