
Supports this firm by enhancing their IT/network security posture to defend against internal and external threats to the organization.

Completed a full analysis of an internal subject laptop, gathered open-source intelligence, and conducted an in-depth cyber forensic

Performed Blackbox vulnerability assessment & Penetration testing which includes assessment of (Mobile Applications

Performed Successful gray box vulnerability assessment which includes assessment of(Web Server, Web Applications

Conducted vulnerability assessment & Penetration testing, including source code review of different application platforms

Conducted Vulnerability Assessment, Infrastructure review, and cloud based application security assessment