Andrea Fabrizi. Curriculum Vitae. Date of Birth: 10/04/1983 City of Birth: Anagni, Italy

Size: px
Start display at page:

Download "Andrea Fabrizi. Curriculum Vitae. Date of Birth: 10/04/1983 City of Birth: Anagni, Italy"

Transcription

1 Curriculum Vitae 1 General Information Name: Andrea Fabrizi Date of Birth: 10/04/1983 City of Birth: Anagni, Italy Place of residence: Luxembourg Phone: Website: andrea.fabrizi () gmail com Date IT career started: March 2005 Years of Experience (IT): 8 years Contractual Status: Current Main : Employee Security Consultant Other s: Developer Highest relevant educational qualification: Certificate and/or diploma School Institute - University From Until Secondary education Science and Maths High School Liceo Scientifico Dante Alighieri Anagni Language Skills Italian English Understanding Listening C2 C1 Reading C2 C1 Speaking Interaction C2 C1 Production C2 C1 Writing Writing C2 C1 Referring to common reference levels (B1 1; B2 5) Page 1 of 9

2 3 Summary Summary: I m an Ethical Hacker and I work as Penetration Tester, breaking through the security systems of our customers to reveal vulnerabilities and threat exposures. I know the OWASP and OSSTMM methodology. I experienced Penetration Tests against a wide range of technologies and systems: Solaris, Linux, Windows, Tru64, HP-UX, Oracle, MySQL, PostgreSQL, Apache, Tomcat, JBoss, WebLogic, Oracle IAS, SAP, Java, PHP, ASP, ColdFusion, Smartcards, Token, SSO, and others. My specialities are penetration testing of web applications, mobile applications and critical systems such as mainframes (AS400, OpenVMS, etc...), live databases and virtualization infrastructures. I'm a Linux enthusiast and an experienced developer, I know C, Java, Python, PHP, C#, JavaScript, HTML, BASH, Assembly (x86 and Microchip PIC) and I experienced developing across multiple platforms (Windows, Linux, Mac, PIC, Android ). This knowledge is very useful for security activities like code review and reverse engineering. When I write software or a piece of code that can be useful to someone I like to publish it on my website. In my free time I like to improve my technical skills, reading security papers, analyzing software or firmware, and if I found interesting vulnerabilities I like to publish advisories or exploits. Only for hobby I have some knowledge of electronics, including Microcontroller programming, PCB design and circuit building. I like to work mostly with embedded Linux systems (MIPS, MIPSEL and x86 based). My specialties: Web Application Security, Reverse Engineering, Penetration Testing, Software development, Code review. Page 2 of 9

3 4 Full Employment overview: Company Customer department Type of Contract Duration (years) Main CV Exp Page Hypergolica / Freelance 3 years System Administrator 1 Unidata Telco Employee 2 years Security Consultant 2 STM Italia Public administration institutions Employee 2 years Security Consultant 3 Business-e Telco/Banks/ Financials Employee 3 years Security Consultant 4 INTRASOFT International European Commission Employee 1 year Security Consultant 5 Page 3 of 9

4 5 Professional Certifications Certification Year obtained RSA Archer Administration 2012 RSA Secure World 2012 Page 4 of 9

5 Professional experience page n 1 Hypergolica Webworks Studio Assignment : Start date End date: Duration (years) 03/ / Customer : Hypergolica Webworks Studio Main Ancillary s Web developer System Administrator Development and administration of web-based CMS. Software designer and developer of web applications and standalone applications; Database designer; Administration and hardening of web, mail and database servers. Linux, FreeBSD, C, PHP, Java, Bash. Page 5 of 9

6 Professional experience page n 2 Unidata S.p.A Assignment : Start date End date: Duration (years) 06/ / Customer : Telecom Italia Main Security consultant Security consultant for a major Italian telecommunication company. Penetration testing of critical systems and infrastructures; Technical security audit; Manual penetration testing, based on OWASP and OSSTMM methodology. Page 6 of 9

7 Professional experience page n 3 STM Italia Assignment : Start date End date: Duration (years) 07/ / Customer : Italian public administration Main Security Consultant Security consultant for a big Italian public administration institution. Computer and network security. Penetration testing; Vulnerability assessment; Security related software development; Security assessment of application firewalls. Manual penetration testing, based on OWASP and OSSTMM methodology. Automatic vulnerability assessment using products like Nessus and IBM Appscan. Page 7 of 9

8 Professional experience page n 4 Business-e S.p.A Assignment: Start date End date: Duration (years) 02/ /2013 > 3 Customer: Telecom Italia, TIM Brazil, Italian Banks and financial institutions. Main Security Consultant Security consultant for a major Italian and international communication company, banks and financial institutions. Penetration testing of web applications, mobile applications, stand-alone applications, critical systems and infrastructures; Compliance and risk analysis; Vulnerability assessment; Security Assessment of virtualization infrastructures; Administration of SIEM, log management and GRC products; Technical and governance security consulting; Security software development. Manual penetration testing, based on OWASP and OSSTMM methodology. Vulnerability Assessment using tools like Nessus and McAfee Foundstone. Page 8 of 9

9 Professional experience page n 5 INTRASOFT International SA Assignment: Start date End date: Duration (years) 03/2013 Ongoing 1 year Customer: European Commission, Luxembourg. Main Security Consultant Security consultant for European Commission in Luxembourg. Penetration testing of web applications, stand-alone applications, critical systems and infrastructures; Vulnerability assessment; Manual penetration testing, based on OWASP and OSSTMM methodology. Page 9 of 9

Application Backdoor Assessment. Complete securing of your applications

Application Backdoor Assessment. Complete securing of your applications Application Backdoor Assessment Complete securing of your applications Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe country Product

More information

Procase Consulting. APEX 4.1 Introduction. Oleg Mochkin

Procase Consulting. APEX 4.1 Introduction. Oleg Mochkin Procase Consulting APEX 4.1 Introduction Oleg Mochkin 1 APEX Users 2 APEX Express Use Cases 3 APEX as Solution Unique RAD tools for Oracle Database Browser based development Declarative way to build Web

More information

DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:

DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities: DTWMS Required Software Engineers 1. Senior Java Programmer (3 Positions) Responsibilities: Responsible to deliver quality software solutions using standard end to end software development cycle Collaborate

More information

TECHNICAL SKILLS UNIX, UNIX-like including Solaris, Linux, Mac OS X, BSD, SySVr4, HP-UX

TECHNICAL SKILLS UNIX, UNIX-like including Solaris, Linux, Mac OS X, BSD, SySVr4, HP-UX CURRICULUM VITAE PERSONAL DETAILS Name: Jerry Rocteur Date of Birth: 14 th June 1959 Nationality: Belgian / Australian Place of Residence: Brussels Languages: English, French, passive Dutch Email: jerry@rocteur.com

More information

Penetration testing & Ethical Hacking. Security Week 2014

Penetration testing & Ethical Hacking. Security Week 2014 Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information

More information

CURRICULUM VITAE PERSONAL DETAILS SURNAME - Macey CHRISTIAN NAMES - Christopher John William TELEPHONE - +352 621304363 Mobile Email mail@chrismacey.com www.chrismacey.com NATIONALITY - British TECHNICAL

More information

Via Amedeo Peyron 12, 10143 Torino (Italy) +39 329 7722959 guido.vicino@gmail.com. Sex Male Date of birth 27 Sep 1982

Via Amedeo Peyron 12, 10143 Torino (Italy) +39 329 7722959 guido.vicino@gmail.com. Sex Male Date of birth 27 Sep 1982 Curriculum vitae PERSONAL INFORMATION Guido Vicino Via Amedeo Peyron 12, 10143 Torino (Italy) +39 329 7722959 guido.vicino@gmail.com Sex Male Date of birth 27 Sep 1982 WORK EXPERIENCE Jul 2007 Present

More information

Web and Mobile development Engineer

Web and Mobile development Engineer amanikon@gmail.com December 2015 Candidate file Web and Mobile development Engineer Adrien Manikon-Mounoussamy Rue de Montreux, 1 68300 Saint-Louis, France Tel : + 336 95900710 26 years old 1 Table of

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

Michele Jr De Candia Curriculum Vitae

Michele Jr De Candia Curriculum Vitae GENERAL INFORMATION Name Michele Jr De Candia Date of birth 27-05-1981 Job and Phone and e-mail Nationality Place of Residence Software Engineer S.M. Optics S.r.l. +393289729336 mdecandia@gmail.com Italian

More information

Programming Languages

Programming Languages Generalist/Senior Developer DOB: July 19, 1978. Marital Status: Married. P: +64 (0) 21 204 5763 Email: kiwijob@icloud.com Location: Te Atatu, Auckland, 0610, NZ. Languages: English: IELTS 7.5 Spanish:

More information

Team Size 20 Responsibility - Managing the business - Managing external projects - Billing advisor to telecommunication company

Team Size 20 Responsibility - Managing the business - Managing external projects - Billing advisor to telecommunication company Professional Working Experience Name of Employer: Origine IT Sdn. Bhd. Director Employment Date Team Size 20 Responsibility - Managing the business - Managing external projects - Billing

More information

Special Topics in Vendor- Specific Systems. Objective

Special Topics in Vendor- Specific Systems. Objective Special Topics in Vendor- Specific Systems Unit 5 System and database architectures used in commercial EHRs Objective Compare database architectures employed by various vendor applications, for fulfilling

More information

Alessio Rolfini. +39-329-8144222 (mobile)

Alessio Rolfini. +39-329-8144222 (mobile) Alessio Rolfini Personal Details Address : Via Misa 20, 40139 Bologna, Italy Date of Birth: 25th September 1976 Nationality: Telephone number: Italian +39-329-8144222 (mobile) Telefax number: +39-051-3371286

More information

Ctrl4C Pricing & Services Catalog

Ctrl4C Pricing & Services Catalog Ctrl4C Pricing & Services Catalog Contents Ctrl4C Feature Overview 3 Control 4 o Monitoring Features o Monitoring Packages o Support Package Compliance 6 o Security Features & Packages o Optional Security

More information

CrownPeak Playbook CrownPeak Hosting with PHP

CrownPeak Playbook CrownPeak Hosting with PHP CrownPeak Playbook CrownPeak Hosting with PHP Version 1.0 2014, Inc. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical,

More information

ANNEX A.1 TECHNICAL SPECIFICATIONS OPEN CALL FOR TENDERS F-SE-13-T01 WEB DEVELOPMENT SERVICES

ANNEX A.1 TECHNICAL SPECIFICATIONS OPEN CALL FOR TENDERS F-SE-13-T01 WEB DEVELOPMENT SERVICES ANNEX A.1 TECHNICAL SPECIFICATIONS OPEN CALL FOR TENDERS F-SE-13-T01 WEB DEVELOPMENT SERVICES Lot 1 Intranet Lot 2 Internet 1 Background information... 3 2 Scope of required services... 3 3 Definition

More information

OracleAS Identity Management Solving Real World Problems

OracleAS Identity Management Solving Real World Problems OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability

More information

The GITO (Global IT & Operations) main goal is to deliver and maintain internal solutions for the business needs.

The GITO (Global IT & Operations) main goal is to deliver and maintain internal solutions for the business needs. Gökçe ASOVA Address and GSM available upon request. http://www.linkedin.com/in/gasova gokce@asova.com http://www.asova.com A creative, enthusiastic and versatile person, with competences and expertise

More information

SOFTWARE TESTING SERVICES

SOFTWARE TESTING SERVICES SOFTWARE TESTING SERVICES testing services PRESENTATION PLAN 1. SOFTWARE TESTING: ROLE & GOALS 2. SOFTWARE TESTING AT SOFTWARE: QUICK FACTS 3. TYPES OF SOFTWARE TESTING SERVICES 4. SUPPORTING DOCUMENTATION

More information

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS) ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3

More information

Security Consulting. Services Overview

Security Consulting. Services Overview Services Overview Dimension Data is a global technology services company, assisting its customers in planning, building and supporting their IT infrastructures. Dimension Data combines its expertise in

More information

SOSFTP Managed File Transfer

SOSFTP Managed File Transfer Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP

More information

BUSINESS SERVICES ORGANISATION - INFORMATION TECHNOLOGY SERVICES. Band 4 ICT Technician JOB DESCRIPTION

BUSINESS SERVICES ORGANISATION - INFORMATION TECHNOLOGY SERVICES. Band 4 ICT Technician JOB DESCRIPTION BUSINESS SERVICES ORGANISATION - INFORMATION TECHNOLOGY SERVICES BAND 4 ICT Technician JOB DESCRIPTION POSTS: REPORTS TO: ACCOUNTABLE TO: LOCATION: BAND: Band 4 ICT Technician (a waiting list may also

More information

AppSentry Application and Database Security Auditing

AppSentry Application and Database Security Auditing AppSentry Application and Database Security Auditing May 2014 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft

More information

Nicholas J. Parks, M.S.W.E

Nicholas J. Parks, M.S.W.E NJP1 Nicholas J. Parks, M.S.W.E Qualifications Highly accomplished Software Solution Developer, Technical Lead, and Architect specializing in conceptualizing, designing, and deploying advanced JavaEE/C++solutions.

More information

Vincenzo Cani Professional Profile

Vincenzo Cani Professional Profile Vincenzo Cani Professional Profile Professional Profile Oct/11 Pag. 1/5 Professional Experiences Period 07/11/2006-31/01/2007 Role or activitie Type Apprenticeship before degree it&it Collaboration in

More information

<Insert Picture Here> Oracle Policy Automation 10.3.1 System Requirements

<Insert Picture Here> Oracle Policy Automation 10.3.1 System Requirements Oracle Policy Automation 10.3.1 System Requirements December 2011 Version 1.01 Oracle Policy Automation Products Version 10.3.1 Overview Product Oracle Policy Modeling Oracle Policy

More information

IT professionals. The skills. need to succeed. Technical IT Training. At a glance

IT professionals. The skills. need to succeed. Technical IT Training. At a glance The skills IT professionals need to succeed Technical IT Training Technology is only as effective as the expertise of the people installing, operating and using it. Developing the right skills is vital

More information

VAT: SE556981-2265. Phone: +46 (0) 733443238

VAT: SE556981-2265. Phone: +46 (0) 733443238 Hello My name is Tord and I'm a freelancing programmer with six years of professional. I like native ios and Android programming as well as web development - including server configuration and maintenance.

More information

Resumé for Adam Pierce Updated February 2011

Resumé for Adam Pierce Updated February 2011 Resumé for Adam Pierce Updated February 2011 Basic Information I'm 40 years old, married with two children. I live in Terrey Hills on Sydney's northern beaches. I am an Australian citizen and English is

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Curriculum Vitae 2015

Curriculum Vitae 2015 Rekhas Fahrizi [Home]: Rusun Sarijadi Blok J No.12 lantai 2 Sarijadi Bandung Jawa barat [Contact]: Email : rekhas.fahrizi@yahoo.com Phone: 082298274200 [Personal Detail] Place of Birth: Karawang Gender:

More information

Access Management Analysis of some available solutions

Access Management Analysis of some available solutions Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available

More information

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM 2 REDUCE COSTS. IMPROVE EFFICIENCY. MANAGE RISK. MaxPatrol from Positive Technologies provides visibility and control of security compliance across your entire

More information

UBITECH Company Presentation

UBITECH Company Presentation UBITECH Company Presentation Ubiquitous Intelligent Technical Solutions Ltd. 429 Messogion Ave., 15343 Ag. Paraskevi, Greece W: T: +30 211 700 55 70 F: +30 211 700 55 71 The Ubiquitous Solutions Company

More information

Federated Network Security Administration Framework

Federated Network Security Administration Framework Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 3, March 2013,

More information

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

New Zealand Company Six full time technical staff Offices in Auckland and Wellington INCREASING THE VALUE OF PENETRATION TESTING ABOUT YOUR PRESENTER Brett Moore Insomnia Security New Zealand Company Six full time technical staff Offices in Auckland and Wellington Penetration Testing Web

More information

AngularJS, Javascript, Prototype-based OO concept, RESTful Design Pattern, GWT, HTML5, Database.

AngularJS, Javascript, Prototype-based OO concept, RESTful Design Pattern, GWT, HTML5, Database. Position Code Role Skillsets Years of Experience TPM01 Senior Back End Application Developer Enterprise Architecture, Java EE, Java Spring Framework, Design Pattern, SOA, JPA, OSGI, Linux, Maven, Tomcat,

More information

Curriculum Vitae. personal details. career objectives

Curriculum Vitae. personal details. career objectives Curriculum Vitae adinolfi raffaele UX designer & team leader personal details date and place of birth 28/01/1977 Turin (Italy) nationality Italian mobile phone +39 339 5676748 email address uxd@raffaeleadinolfi.it

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Guardium Change Auditing System (CAS)

Guardium Change Auditing System (CAS) Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity

More information

HOB WSP Web-Server-Gate Secure Access for Mobile Users and Business Partners to Enterprise Web Servers

HOB WSP Web-Server-Gate Secure Access for Mobile Users and Business Partners to Enterprise Web Servers HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: 09103 / 715-0 Fax: 09103 / 715-271 E-Mail: support@hob.de Internet: www.hobsoft.com HOB WSP Web-Server-Gate Secure Access for Mobile Users and

More information

Masters Degree Information Technology CCSE, CCSA, MCSE, CISSP. English, Danish, Persian, Spanish, Portuguese, Azeri and Turkish

Masters Degree Information Technology CCSE, CCSA, MCSE, CISSP. English, Danish, Persian, Spanish, Portuguese, Azeri and Turkish SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: Availability: BT2691 UNIX Security Specialist British and Danish 13 years Masters Degree

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the

More information

IBM Security AppScan Source

IBM Security AppScan Source Source Secure traditional and mobile applications and build secure software with static application security testing Highlights Identify vulnerabilities in your source code, review data and call flows,

More information

Exposé Ing. Jörg Pöschko

Exposé Ing. Jörg Pöschko Exposé Ing. Jörg Pöschko Personal Emphases, Experiences & Skills Software engineering: analysis, structuring, documentation, conception, coordination and implementation of customer needs, testing Object-oriented

More information

Luca Caucchioli Information Technology Consultant

Luca Caucchioli Information Technology Consultant Luca Caucchioli Information Technology Consultant Profile Hello my name is Luca Caucchioli, I am a information technology consultant I was born on March 24, 1979. I live in Bovolone near Verona (Italy).

More information

Price List. Phone Number (919)728-0386 E-mail Address rjdohnert@pc-opensystems.com Mailing Address PO Box 698 Franklinton NC 27525

Price List. Phone Number (919)728-0386 E-mail Address rjdohnert@pc-opensystems.com Mailing Address PO Box 698 Franklinton NC 27525 Price List Published By Roberto J. Dohnert, Sept 15, 2012 Rev (01) Oct 17, 2012 Rev(02) May 21, 2013 This is a current list and pricing strategy for PC/OpenSystems LLC consulting division. These prices

More information

WHITE PAPER. Domo Advanced Architecture

WHITE PAPER. Domo Advanced Architecture WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization

More information

Michael Bösch. EDV-Consulting. Dipl. Informatiker (FH)

Michael Bösch. EDV-Consulting. Dipl. Informatiker (FH) Michael Bösch Dipl. Informatiker (FH) EDV-Consulting Äußeres Pfaffengäßchen 11B 86152 Augsburg Germany Tel.: +49-821-4206523 Fax: +49-821-4206524 Mobil: +49-172-8628736 E-Mail: boesch@boesch-it.de Home-Page:

More information

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Ragy Magdy Regional Channel Manager MEA IBM Security Systems Ragy Magdy Regional Channel Manager MEA IBM Security Systems 1 Started my career in Security in 2003 by Joining ISS 2005 was named the ISS Regional Manager for the Middle East 2006 ISS was acquired by

More information

Nanda Kishor K N. nandakishorkn@gmail.com +91-98458 94322 www.nandakishor.com

Nanda Kishor K N. nandakishorkn@gmail.com +91-98458 94322 www.nandakishor.com Objective: Seeking a challenging environment where my knowledge and experience can be shared and enriched. Experience Summary: 10 years of work experience in developing Java/J2EE based applications. Current

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Integrigy Corporate Overview

Integrigy Corporate Overview mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation

More information

Hamish Whittal, 41. PRESENT POSITION: IT Manager, SAAO, Cape Town.

Hamish Whittal, 41. PRESENT POSITION: IT Manager, SAAO, Cape Town. Hamish Whittal, 41 PRESENT POSITION: IT Manager, SAAO, Cape Town. BACKGROUND I have been involved in the IT industry for over 16 years and over this time have worked in a number of diverse environments,

More information

John Smith Prattville, AL career@hashbangsecurity.com

John Smith Prattville, AL career@hashbangsecurity.com John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position

More information

internet, intranet and software development Ross McKay résumé

internet, intranet and software development Ross McKay résumé internet, intranet and software development Ross McKay résumé July 2010 Personal Details Name: Ross Donald McKay Postal Address: PO Box 71 Toronto NSW 2283 Australia Telephone: 0417 401 099 Email: Web

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

* Testing Engineer * System Engineer * Sales * Internal Support Engineer

* Testing Engineer * System Engineer * Sales * Internal Support Engineer Dear all, On behalf of XYBASE Sdn. Bhd., I would like to inform that we have few job vacancies for:- * Testing Engineer * System Engineer * Sales * Internal Support Engineer Thanks & regards Saro - HR

More information

Architecture and Mode of Operation

Architecture and Mode of Operation Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security

More information

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Denim Group Company Background Denim Group, an IT consultancy specializing in custom software development, systems integration and application security, serves a national and international client base

More information

Artezio Company Profile

Artezio Company Profile Artezio Company Profile Artezio is an ISO 9001:2008 certified software development company. Over the last ten years, Artezio has completed more than 500 projects for its international corporate customer

More information

WEB APPLICATION VULNERABILITY STATISTICS (2013)

WEB APPLICATION VULNERABILITY STATISTICS (2013) WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most

More information

IS Careers. MIS 4133 Software Systems

IS Careers. MIS 4133 Software Systems IS Careers MIS 4133 Software Systems Outline CS and MIS Salaries Core competencies Hot technical skills IS job titles Employment outlook Careers in CS and MIS Computer Science Focuses on the development

More information

System requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit)

System requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit) Hitachi Solutions Geographical Information System Client Below conditions are system requirements for Hitachi Solutions Geographical Information System Client. 1/5 Hitachi Solutions Geographical Information

More information

BLIND SQL INJECTION (UBC)

BLIND SQL INJECTION (UBC) WaveFront Consulting Group BLIND SQL INJECTION (UBC) Rui Pereira,B.Sc.(Hons),CISSP,CIPS ISP,CISA,CWNA,CPTS/CPTE WaveFront Consulting Group Ltd ruiper@wavefrontcg.com www.wavefrontcg.com 1 This material

More information

STEP Networks Inc. 1-1385 North routledge Park Ontario, Canada, N6H 5N5 www.stepnetworks.com OUR COMMITMENT TO EXCELLENCE

STEP Networks Inc. 1-1385 North routledge Park Ontario, Canada, N6H 5N5 www.stepnetworks.com OUR COMMITMENT TO EXCELLENCE OUR COMMITMENT TO EXCELLENCE STEP Networks is your source for leading edge Software Development and Consulting Services. Our reputation is builton over 30 years of custom software application development

More information

Software Development & Outsourcing. February 7, 2007

Software Development & Outsourcing. February 7, 2007 Software Development & Outsourcing February 7, 2007 About Enformatic Enformatic is a custom IT solutions provider offering software development, telecommunications, and networking services for customers

More information

CONTENTS. Introduction 3. Our Team 5. Our Strategy 6. Solution Domains We Serve 7. Technology Platforms We Serve 8. Our Execution Practices 10

CONTENTS. Introduction 3. Our Team 5. Our Strategy 6. Solution Domains We Serve 7. Technology Platforms We Serve 8. Our Execution Practices 10 Introduction 3 Our Difference 3 Our Vision 4 Our Mission 4 Our Team 5 Our Strategy 6 Solution Domains We Serve 7 Technology Platforms We Serve 8 Our Execution Practices 10 We Are Agile Practitioners 10

More information

SBP is a software development outsourcing company, established in 2004, and headquartered in Bucharest, Romania.

SBP is a software development outsourcing company, established in 2004, and headquartered in Bucharest, Romania. SBP is a software development outsourcing company, established in 2004, and headquartered in Bucharest, Romania. We provide outsourcing services to a series of customers mostly located in Northern America

More information

Diploma in Computer Science

Diploma in Computer Science SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer

More information

Curriculum Vitae. Personal information. Chamara Suseema Withanachchi. Desired employment / Occupational field. IBM i RPG Programmer (AS/400)

Curriculum Vitae. Personal information. Chamara Suseema Withanachchi. Desired employment / Occupational field. IBM i RPG Programmer (AS/400) Curriculum Vitae Personal information First name(s) / Surname(s) Address Flat No 503, S. S. Lootha Building, King Fizal Road Sharjah (United Arab Emirates) Telephone(s) + 971 6 5730339 Mobile + 971 50

More information

TCS Managed Security Services

TCS Managed Security Services IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming

More information

PangoMedia, Inc. Statement of Qualifications

PangoMedia, Inc. Statement of Qualifications z PangoMedia, Inc. Statement of Qualifications PangoMedia, Inc. Statement of QualificationPage 1 Friday, October 22, 2009 About PangoMedia Founded in 1997, PangoMedia, Inc. is an Alaskan company providing

More information

Annex 10 Standard Profile Specification and Request Form for Services

Annex 10 Standard Profile Specification and Request Form for Services Annex 10 Standard Profile Specification and Request Form for Services London, Request number: Framework Contract No.: To: Company : Contact: Telephone: e-mail address: Description of the required service:

More information

BMS Consulting Cyber Security and IT Technology Team

BMS Consulting Cyber Security and IT Technology Team BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the

More information

EDUCATIONAL QUALIFICATIONS

EDUCATIONAL QUALIFICATIONS Sanoop Sahadevan Email:-sanoop.devan13@gmail.com Mobile Number: - +971505147673 +919544440357 (India) CURRICULUM VITAE CAREER OBJECTIVE Seeking a good position in a reputed company where I can improve

More information

Nick Metrowsky. 3624 Oakwood Drive Longmont CO 80503-7560 nmetro@sgsosu.net 720-340-4546 http://www.sgsosu.net/nmetro http://www.sgsosu.

Nick Metrowsky. 3624 Oakwood Drive Longmont CO 80503-7560 nmetro@sgsosu.net 720-340-4546 http://www.sgsosu.net/nmetro http://www.sgsosu. Nick Metrowsky 3624 Oakwood Drive Longmont CO 80503-7560 nmetro@sgsosu.net 720-340-4546 http://www.sgsosu.net/nmetro http://www.sgsosu.net SUMMARY SPECIALTIES I am a seasoned Information Technology professional

More information

THE OPEN SOURCE DEVELOPER REPORT

THE OPEN SOURCE DEVELOPER REPORT THE OPEN SOURCE DEVELOPER REPORT 2011 ECLIPSE COMMUNITY SURVEY JUNE 20 11 EXECUTIVE SUMMARY Eclipse is a large, vibrant, well-established open source community with over 200 open source projects, close

More information

EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012

EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012 EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012 This report provides information about software releases, including release dates, any announced

More information

RAY L BURGESS 2727 Sheridan Drive, Tonawanda NY 14150 Phone: (814) 769-3438 E-mail: ray.lee.burgess@gmail.com

RAY L BURGESS 2727 Sheridan Drive, Tonawanda NY 14150 Phone: (814) 769-3438 E-mail: ray.lee.burgess@gmail.com RAY L BURGESS 2727 Sheridan Drive, Tonawanda NY 14150 Phone: (814) 769-3438 E-mail: ray.lee.burgess@gmail.com WORK EXPERIENCE Drupal Developer / Web Services Technician (04/2015 04/2016) College of Health

More information

DMZ Gateways: Secret Weapons for Data Security

DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE

More information

Inputsoft Business Software & Consulting. Learn more at www.inputsoft.com

Inputsoft Business Software & Consulting. Learn more at www.inputsoft.com Inputsoft Business Software & Consulting Learn more at www.inputsoft.com Services Our Strategic focus and creative innovations helps you expand your business globally ENTERPRISE SOLUTIONS WEB APPLICATION

More information

A Network Administrator s Guide to Web App Security

A Network Administrator s Guide to Web App Security A Network Administrator s Guide to Web App Security Speaker: Orion Cassetto, Product Marketing Manager, Incapsula Moderator: Rich Nass, OpenSystems Media Agenda Housekeeping Presentation Questions and

More information

IBM Rational AppScan Source Edition

IBM Rational AppScan Source Edition IBM Software November 2011 IBM Rational AppScan Source Edition Secure applications and build secure software with static application security testing Highlights Identify vulnerabilities in your source

More information

THE OPEN SOURCE DEVELOPER REPORT

THE OPEN SOURCE DEVELOPER REPORT THE OPEN SOURCE DEVELOPER REPORT 2009 ECLIPSE COMMUNITY SURVEY M A Y 2 0 0 9 COPYRIGHT 2009 THE ECLIPSE FOUNDATION ALL RIGHTS RESERVED THIS WORK I S LIC EN SE D UND ER TH E C RE ATI VE COMMON S ATTRIBUT

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

Contents. BMC Atrium Core 7.6.00 Compatibility Matrix

Contents. BMC Atrium Core 7.6.00 Compatibility Matrix Contents INTRODUCTION... 2 Supported Configurations... 2 Known Issues... 2 Potential Issues... 2 Support Policy for later versions of vendor products released after Atrium Core 7.5.00... 2 BMC ATRIUM CMDB,

More information

IT DELIVERY CENTER IN BUCHAREST

IT DELIVERY CENTER IN BUCHAREST IT DELIVERY CENTER IN BUCHAREST DOMAIN EXPERTISE CONSULTING STAFFING APPLICATION SERVICES QUALITY ASSURANCE Greater business value. Higher satisfaction of internal and external customers. More efficient

More information

Operating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List):

Operating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List): Product Version: Gigasoft Software: Post6.0 Description: This document lists the available operating systems, platforms, and applications specifically tested to be compatible with Ahsay software. Contents:

More information

SOFTWARE TESTING PROCESSES PRESENTATION

SOFTWARE TESTING PROCESSES PRESENTATION SOFTWARE TESTING PROCESSES PRESENTATION Agenda 1. Software testing (ST) tasks and objectives 2. ST documentation 3. Types of tests 4. Functional testing process 5. Process supporting tools 6. Performance

More information

FEATURES. Full featured multiplatform agents for Windows, HP-UX, Solaris, BSD, AIX and Linux.

FEATURES. Full featured multiplatform agents for Windows, HP-UX, Solaris, BSD, AIX and Linux. W E L C O M E T O M O N I T O R I N G H E A V E N Pandora FMS is a software-monitoring tool that has been created for all kinds of companies. It is specially designed for large environments and works by

More information

UBS Training Course Catalog

UBS Training Course Catalog 2014 COURSE CATALOG SECURITY COURSES Advanced Ethical Hacking Secure Android Development Secure ios Development C/C++ Programming Security Complete Windows Security Cryptography Overview Designing Secure

More information

S-Power Software Solutions Enterprise Class Software Solutions for Small- and Medium- Sized Business Environments at Breathtaking Price

S-Power Software Solutions Enterprise Class Software Solutions for Small- and Medium- Sized Business Environments at Breathtaking Price S-Power GmbH S-Power Software Solutions Enterprise Class Software Solutions for Small- and Medium- Sized Business Environments at Breathtaking Price 17 th February 2006 Page 1 Offshore Software Development

More information

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011 Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing

More information

Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007

Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Internet Engineering: Web Application Architecture Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Centralized Architecture mainframe terminals terminals 2 Two Tier Application

More information

ASSOCIATE IN ARTS DEGREE-60 UNITS

ASSOCIATE IN ARTS DEGREE-60 UNITS + A Course of Study for a Major in Computer Science A.A. Degree & Certificate Programs The field of computer science leads to a variety of careers that all require core computer science skills. These skills

More information