Banner Image

Skills

  • Security Consulting
  • Bash
  • Cisco Network Devices
  • Compliance Consulting
  • Engineering
  • Linux Programming
  • Networking
  • Python
  • Reports
  • Routers
  • Server Administration
  • Skill
  • Ssh
  • Systems Engineering
  • Tooling Design

Sign up or Log in to see more.

Services

  • Cyber Security freelancer

    $10/hr Starting at $25 Ongoing

    Dedicated Resource

    Hello i am a cyber security student able to assess your digital assets using a professional level methodology and deliver post-auditing reports that are compliant with modern standards

    ReportsSecurity Consulting
  • these are my skills

    $5/hr Starting at $25 Ongoing

    Dedicated Resource

    •Experience with Linux networking configuration, administration, BASH scripting task automation. •Performed SSH server configurations with asymmetric key authentication for multiple users. •Knowledge...

    BashCisco Network DevicesCompliance ConsultingEngineeringLinux Programming

About

•Experience with Linux networking configuration, administration, BASH scripting task automation.
•Performed SSH server configurations with asymmetric key authentication for multiple users.
•Knowledge of virtualized technology, such as VMware and docker, server hosting and basic configuration.
•Usage of and modification of publicly available exploits to audit systems using enumeration and reconnaissance techniques.
•Ability to learn fast and apply critical thinking to projects without any prior knowledge of the subject.
•Experience with multiple tools Kali Linux such as Metasploit, Nmap, Dirbuster and other security-oriented distros to perform security auditing and compliance testing
Experience with CISCO entry-level device configuration such as routers and switches.
•Troubleshooting computers and servers using a methodological approach standard by Odesie
•Able to search publicly available sources to understand new concepts/resolve problems.
•Understanding terminology and jargon that pertains to the information technology field.
•Experience with 32-bit ELF reverse engineering and buffer overflow using Mona, GDB, Python and immunity debugger.