Banner Image

Skills

  • Management
  • Nagios
  • Networking
  • Security Consulting
  • Amazon
  • Antispam
  • Antivirus
  • App Development
  • Checkpoint
  • Cisco
  • Cisco ASA
  • Cisco PIX
  • Cloud Computing
  • Communications Technology
  • Compliance Consulting

Sign up or Log in to see more.

Services

  • Vulnerability Assessment

    $40/hr Starting at $250 Ongoing

    Dedicated Resource

    Is your mobile application or website secure from hackers? More than 70% websites or mobile apps are not. What I offer I can do vulnerability assessment for your website and mobile app which includes...

    AntispamAntivirusCheckpointCisco ASACisco PIX
  • Infrastructure Monitoring

    $40/hr Starting at $50 Ongoing

    Dedicated Resource

    I will setup centralized monitoring servers like Nagios, Newrelic, datadog, Grafana, Zabbix, Splunk, Wazuh, QRADAR or any other Infrastructure or Application Performance monitoring (APM) or Security Event...

    AmazonApp DevelopmentCiscoCloud ComputingCommunications Technology
  • Compliance Policy Standards

    $50/hr Starting at $300 Ongoing

    Dedicated Resource

    About the Service A highly professional who has completed internal + external audits in different organizations. I consulted organizations for Information Security policies, procedures and standards using...

    Compliance ConsultingDocument DesignGap AnalysisGDPRHIPAA

About

I have experience in handling varying cyber incidents, security threats, regulating data access, security related policies, vulnerability assessments, conducting of pentest of web and mobile apps, reviewing security logs, configuration of security devices, facilitated the external and internal compliance audit and leading various security task forces at my current/previous employers. I am confident I will be an asset to you for these very reasons.

With high profile data breaches making the news lately, it is vital for companies that can provide safety guarantees to customers. I take pride in knowing that I can help in planning and maintaining those various security settings, both internally and externally. Through continuous education and research, I am up-to-date on industry trends and technologies and remain one step ahead of cyber attacks. It is my focus to ensure company information remains safe and in the proper control.

Building a strong, focused, and dedicated team has helped me develop a successful career, thus far. I believe in professional development, leading by example, and that you are only as strong as your weakest link. I hope to help/develop your existing team or can create a new team from scratch and be a positive role model for security compliance and identifying potential threats.

Work Terms

As far as work terms are concerned I ll be available for your services at any time. Reliability and customer satisfaction are my priority. I prefer to work on hourly basis or project based.