Banner Image

Skills

  • Antispam
  • Antivirus
  • Checkpoint
  • Cisco ASA
  • Cisco PIX
  • Cyber Security
  • Data Security
  • Digital Marketing
  • Digital Signature
  • Email Security
  • Encryption Software
  • E-signature
  • Ethical Hacking
  • iptables
  • Malware Removal

Sign up or Log in to see more.

Services

  • Cyber Security Expert/ Digital Marketing

    $100/hr Starting at $50 Ongoing

    Dedicated Resource

    I'm a professional Cyber Security Expert. I am owner & founder of SAM I.T & MARKETING SOLUTION i already have done many projects about Cyber Security & Bug Bounty! I write to express my interest in the...

    AntispamAntivirusCheckpointCisco ASACisco PIX

About

"Your security is our top priority"

I'm a professional Cyber Security Expert / Digital Marketing Expert / Software Engineer & Programmer. I am owner & founder of SAM I.T & MARKETING SOLUTION. I already have done many projects about Cyber Security & Bug Bounty! I write to express my interest in the Information Security Analyst job with Network Security. I am a seasoned cybersecurity professional with 9 years of experience providing cybersecurity solutions and working proactively to keep large companies secure from cyber attacks, hackers, malware, and other threats.

In my current role as Cybersecurity Engineer & Senior SOC Analyst with NSA (NATIONAL SECURITY AGENCY), I work as part of a large cybersecurity team to maintain cybersecurity best practices, ensure sensitive data and documents are secure, and anticipate possible threats to keep the organization a step ahead. Over the course of my career with Document Resources, I have reduced security risks by more than 33% by implementing physical access controls and a multi-layer security system that includes antispyware and antivirus software.

I have followed Network Security since its inception in 2013 and I know the organization holds itself to a high standard as a risk-free environment. I am confident that my strengths in cybersecurity strategy, information security, and IT operations could allow me to thrive as an Information Security Analyst while bringing significant value to the organization.