Gabriel Vando
******@*****.***
Objective
To obtain a crowning status in the technological industry as an efficient certified ethical hacker and demonstrate exceptional skills and talents linked with the profile Summary of Qualifications
Conducted network penetration tests and implemented vulnerability assessments.
Evaluated operational effects of security system attacks.
Analyzed and resolved vulnerabilities in relation to automated networks.
Prepared and documented test plans for security evaluations.
Designed and updated reports about security of targeted systems.
Extensive knowledge of Computer System Information
Extensive knowledge in Networking and Security
Strong organizational and management skills
Strong problem-solving skills
Provides technical oversight for specified projects, and across multiple projects, to ensure that technologies within the information security capability are properly leveraged.
Ability to handle highly confidential information in a strictly professional manner.
Ability to maintain professional demeanor in times of high stress. Education
BA in Computer System Management with GPA of 3.5(Magna cum Laude)
Certified Ethical Hacker v9 by ECCouncil
Computer Network Administrator
Network Security
Fluent in English and Spanish
Computer Savvy
Hacking Academy Certificate
Monitoring Transmitted Course Certification
Cyber Security Certificate
Professional Experience
Organization: Advanced Bio Systems Corp, San Juan, PR Designation: President & CEO
Tenure: 1996 to 2015
Performing sophisticated penetration examinations for ascertaining the technical weaknesses existing the computer systems
Finding out effective ways of manipulating the vulnerable domains of the systems
Maintaining high level of security of the information that is crucial for the business growth of the organization
Formulating hard-hitting measures that can portray threat to the significant information owned by the organization
Identifying efficient measures of sustaining network security at a constant rate
Becoming familiar with the business functions and infrastructure of the organization
Carefully assessing the software environments and examining the level of risk that they can pose to the network systems of the organization
Performing latest assessments with a view to come up with possible solutions for eradicating network related vulnerabilities