Banner Image

All Services

Programming & Development

Linux System Engineer /Devops/Security

$20/hr Starting at $200

Detailed technical knowledge and hands-on experience of DevOps, Automation, Build Engineering, Configuration and Server Management, Administration, Migrations Extensive experience in the design and implementation of fully automated Continuous Integration, Continuous Delivery, Continuous Deployment pipelines and DevOps processes for Agile projects across the Financial, Media, ISP and Government Sectors Over 20 years IT experience, UNIX/Linux Admin experience, and a Middleware/Application Server Integration Specialist. Vulnerability scans and reports are available on request for systems as well as for applications. Though they share the same purpose -- to qualify and prioritize risk -- a system vulnerability scan is not a penetration test, but rather enumerates known vulnerabilities of a system, and prioritizes them according to likelihood and impact of exploitation. Web application scans will attempt to exploit found software vulnerabilities, and qualify the vulnerability by severity and certainty of exploitation.

About

$20/hr Ongoing

Download Resume

Detailed technical knowledge and hands-on experience of DevOps, Automation, Build Engineering, Configuration and Server Management, Administration, Migrations Extensive experience in the design and implementation of fully automated Continuous Integration, Continuous Delivery, Continuous Deployment pipelines and DevOps processes for Agile projects across the Financial, Media, ISP and Government Sectors Over 20 years IT experience, UNIX/Linux Admin experience, and a Middleware/Application Server Integration Specialist. Vulnerability scans and reports are available on request for systems as well as for applications. Though they share the same purpose -- to qualify and prioritize risk -- a system vulnerability scan is not a penetration test, but rather enumerates known vulnerabilities of a system, and prioritizes them according to likelihood and impact of exploitation. Web application scans will attempt to exploit found software vulnerabilities, and qualify the vulnerability by severity and certainty of exploitation.

Skills & Expertise

Compliance ConsultingDevOpsEngineeringLinuxLinux ProgrammingLinux System AdministrationRadiusReportsScanScanningSecurity ConsultingSoftware DevelopmentSystems EngineeringVulnerabilities

0 Reviews

This Freelancer has not received any feedback.