Post Job Free

Resume

Sign in

Web Developer Security

Location:
Rochester, NY
Posted:
April 19, 2021

Contact this candidate

Resume:

Abdulmalik Banaser Phone: 202-***-****

Email: adls4r@r.postjobfree.com

LinkedIn: Abdulmalik-Banaser

GitHub: github.com/Abanaser

Objective

Talented programmer. Computing Security student interested in Secure Software, DevOps, Incident Response, and Offensive Security. I am currently seeking Cybersecurity, DevOps, and Software engineering CO-OP/internship in Summer 2021.

Education

Rochester Institute of Technology Rochester, NY

Bachelor of Science in Computing Security. GPA: 3.94. 2019–2022 Earned the dean’s list for the Fall, and Spring of 2019/2020, Fall 2020/2021 semesters. additional training

Udacity Online

Front-End Web Developer Nanodegree. Jan 2019–May 2019 An intensive advanced course was covering different topics in web applications development. The main goals are:

– Build web applications/sites using HTML, CSS, and JavaScript.

– Connect a web application to back-end server data using JavaScript.

– Introductory level of interaction with APIs.

Saudi Telecom Company (STC) Riyadh, SA

Certification of completion was covering NETWORK+, SERVER+, CSP+, and CPTE. Jun 2018–Jul 2018 A Cybersecurity program focused on Networking, Server Management, Penetration Testing, Security policies and audit, with various theories and hands-on experience. Experience

The Manufacture of Future Fortune Riyadh, SA

Full stack developer May 2017–Jan 2018

– Worked on the web-based application for businesses.

– While working on different projects, different frameworks were in use, such as React. Skills – Promoted - Advanced* to be one of the programming teams’ lead to manage the assigned project’s workflow.

• Programming languages:

Java* Python* C JavaScript HTML* CSS* • Networking: TCP/IP model* Active Directory DHCP DNS*

• Operating systems:

Linux* Windows PFSense* (FreeBSD) • Platforms: Projects Hack the box* VulnHub CTFs*

See full list of projects on github.com/Abanaser

• Home-lab (Virtualization, 2019)

Used ESXi as type one hypervisor.

Used VCenter to control ESXi instance.

Used PFSense to mange the internal and external

networks.

Used Windows Server as AD, and DNS server.

• BufferOverFlow Automation (Python, 2019)

Automating BufferOverFlow exploit using a python script for: Fuzzing.

Finding EIP offset.

Hijacking the EIP.

Exploit the vulnerable software.

Competitions

• Blue team: Incident response

Perform an analysis of information systems to ensure security.

- Incidents Response Sec 2019/2020 UB-Lockdown 2019

• Black team: DevOps

Deploying virtual machines and ensure stability during the event.

- Incidents Response Sec 2020.5

• White team: Administration/Management

We are managing and overseas the Cyberdefense competition.

- Collegiate Penetration Testing Competition 2019 Infor- mation Security Talent Search 2019

• CTFs:

- RITSEC-CTF 2019 PicoCTF 2020 MetaCTF 2020

Page 1 of 1



Contact this candidate