Lees Summit, MO, 64063
... • Simulated enterprise breach scenarios in Capture The Flag (CTF) competitions, focusing on initial access, privilege escalation, and post-exploitation techniques. Virtually Testing Foundation - Cybersecurity Engineer Internship (Remote) May 2022 - ...
- Jun 07
El Paso, TX
... Developed training materials and conducted training instruction for Emergence Health Network (EHN) personnel on the importance of customer service and on identifying and reporting abuse, neglect or exploitation. Assists Service Members in initiating ...
- Jun 05
Newark, NJ
... Vaste expérience avec diverses applications, systemes d'exploitation et plates-formes REALISATIONS + Utilisation de Microsoft Excel pour développer des feuilles de calcul de suivi des stocks. Equipe supervisée composée de [Nombre] membres du ...
- Jun 04
Battle Creek, MI
... - Performed vulnerability scans, privilege escalation, and web application exploitation. - Used tools like Nessus, Wireshark, and Metasploit. - (Add your rank or TryHackMe username for credibility if desired) Education - Bachelor of Science – ...
- Jun 03
Fort Meade, MD
... Instrumental in the development of USCYBERCOM’s Capability Based Assessment (CBA), focus areas were Processing, Exploitation and Dissemination (PED), Malware and Human Intelligence (HUMINT) The division lead for Intelligence Certification of JCID ...
- Jun 02
Tucson, AZ
Tina Presuhn ***********@*****.*** 520-***-**** 85737 Skills ●Customer service ●Educational Speaker ●Youth Safety Advocate Work Experience Power over Predators/Mothers Against Child Exploitation Tucson, AZ 7/2020 to Present Speaker, Trade Show ...
- Jun 02
Oviedo, FL
... • Analyzed stack memory layout and documented exploitation steps with screenshots on UCF's Eustis server. Mutation-Based Fuzzer for JPEG2BMP • Implemented a Python-based fuzzer injecting mutations into JPEG files to uncover crashes in jpeg2bmp. • ...
- Jun 01
Fernandina Beach, FL
... Page 2 • Gathered, analyzed & prepared intelligence information to make recommendations related to CI/SIGINT & OSINT exploitation. • Briefed Intelligence & issues numerous times to Commanders & Flag level officers. • Developed sophisticated ...
- Jun 01
Virginia
... and analysis to government agencies for security clearance adjudication Screener (Tagalog/Cebuano)- National Media Exploitation Center Feb 2014 – Nov 2015 Leidos ● Conducted media exploitation of collected materials and extracted elements of ...
- May 31
Macomb, MI
... • Created a penetration test report based on real-world exploitation labs, covering Linux, Windows, client-side attacks, social engineering, and post-exploitation tactics to simulate and analyze system vulnerabilities. EXPERIENCE March 2020 – ...
- May 29