LR Luka Ramishvili
Brooklyn, NY ***** +1-347-***-****
adyj5q@r.postjobfree.com
WEBSITES,
PORTFOLIOS,
PROFILES
PROFESSIONAL
SUMMARY
More information about me - https://lukaramishvili.net/ I am a prodigious ethical hacker, who embarked on his journey in the world of cybersecurity at the age of just 11. With a natural talent for computer systems, I was already helping large companies fix website vulnerabilities by the age of 13. At the impressive age of 14, he started teaching online, and quickly garnered the attention of over 800 students.
My remarkable skills led me to work with major corporations when he was just 15 years old. My innate abilities to detect and fix vulnerabilities were recognized when I won the prestigious Forbes Georgia award at the tender age of 17 with his AI cyber security company.
Now, at the age of 18, I continues to push the boundaries in the field of ethical hacking.I has a keep eye for discovering critical vulnerabilities and is currently writing a book on cyber security and ethical hacking . SKILLS Problem Analysis
Security Logging
Risk Mitigation Strategies
Firewall Software
Security Vulnerability and
Penetration Testing
Securing Networks
Identifying Risks
Threat Assessment
Bug Fixes
Incident Investigation
Computer Forensics
Coding Review
Nmap
Cloud Security Application
Reverse Engineering
Data Encryption
Information Security Technology
Kali Linux
Providing Briefings
Performance Improvement
Regulatory Requirements
Financial Statements
Virtual Local Area Networks
Departmental Operations
International Financial Reporting
Standards (IFRS)
Security Vulnerability Assessment
Policy Standards and Guidelines
Monitoring Plans
Regulatory Compliance and
Documentation
Video Surveillance Systems
Plan of Actions & Milestones
(POA&M)
Payment Card Industry Data
Security Standard (PCI DSS)
User Documentation Production
Debugging Systems
Page Layouts
https://lukaramishvili.net/
https://www.linkedin.com/in/luka-ramishvili-b93706248/ https://www.instagram.com/lukaramishvilii/
Design Improvements
Corporate Regulations
Patching
Final Design Delivery
Production Work
New System Research
Network Performance Analysis
Printing Management System
Software
Web Applications
Work Orders
Internet-Facing Projects
Preventative Maintenance
WORK HISTORY CYBER SECURITY SPECIALIST
Reeducate Georgia
Monitored computer virus reports to determine when to update virus protection systems.
Managed data center system upgrades, delivering better reliability and security for server hosting and enterprise applications. Researched and developed new computer forensic tools. Provided consultation and technical services on all aspects of information security.
Performed risk analyses to identify appropriate security countermeasures. Performed risk and vulnerability assessments and provided results and recommendations to senior management.
HONORABLE MEMBER 10/2022 to 02/2023
Google USA
As a bug bounty hunter at Google, I take pride in finding and reporting security vulnerabilities that can potentially harm the company and its users. Recently, I came across two critical vulnerabilities in Google's servers that required immediate attention and action.
The first vulnerability allowed an unauthorized user to bypass the authentication system and gain access to sensitive data and resources. This could have led to data theft, data tampering, or even a full-scale cyber attack. The second vulnerability involved a flaw in the server's configuration that allowed an attacker to remotely execute code and take control of the server. This could have resulted in a complete system compromise and a major breach of trust. After discovering these vulnerabilities, I immediately reported them to Google's security team through their bug bounty program. I provided a detailed report of my findings, along with proof of concept code and steps to reproduce the issues. I also offered my assistance in testing and verifying any fixes or mitigations that Google may implement.
I take my responsibility as a bug bounty hunter seriously, and I believe that my findings will help Google improve the security of their systems and protect their users' data. I hope that this experience will encourage more companies to embrace bug bounty programs and work together with the security community to make the internet
a safer place.
https://bughunters.google.com/profile/549e59d9-df3e-4f1f- 964d-bee35edaafb4
SENIOR PENETRATION TESTER 03/2022 to 01/2023
Cyber-Wall USA, NY
Analyzed security policies for usefulness and value to suggest security policy improvements.
Assessed threats, risks and vulnerabilities from emerging security issues to advise pertinent stakeholders on appropriate measures. Designed tests and tools to break into security-protected applications and networks to probe for vulnerabilities.
Identified issues, analyzed information and provided solutions to problems. RED TEAM 05/2021 to CURRENT
Re:invent Georgia
As a Cyber Security Red Team Specialist, I specialize in identifying and exploiting vulnerabilities in computer systems and networks. My primary responsibility is to simulate real-world attacks and test the effectiveness of our organization's security measures. I work in a team of skilled professionals, including blue team members, penetration testers, and incident response experts, to enhance our organization's overall security posture. Key Responsibilities:
Conduct penetration testing, vulnerability assessments, and social engineering tests to identify weaknesses and gaps in our organization's security defenses
Develop and execute red team scenarios that simulate advanced persistent threats (APTs) and other sophisticated attack vectors Provide recommendations for remediation and mitigation of vulnerabilities and weaknesses
Collaborate with blue team members to develop and test incident response plans and procedures
Stay up-to-date with the latest security trends, technologies, and attack techniques
Write detailed reports that document findings, recommendations, and remediation progress
Participate in tabletop exercises and red team vs. blue team exercises to simulate and test the effectiveness of our security defenses Work with other security professionals and stakeholders to educate and promote security awareness across the organization. Skills and Qualifications:
Strong understanding of computer networks, operating systems, and security protocols
Proficiency in common penetration testing tools and techniques Knowledge of social engineering tactics and methods Familiarity with industry-standard frameworks and methodologies such as NIST, MITRE ATT&CK, and the Cyber Kill Chain
Excellent written and verbal communication skills
Ability to work effectively in a team environment
Strong problem-solving and analytical skills
Relevant certifications such as OSCP, OSCE, GPEN, or GXPN are preferred.
As a Cyber Security Red Team Specialist, I am committed to protecting our organization's critical assets and ensuring that we maintain a strong security posture in the face of evolving threats.
CYBERSECURITY LECTURER 03/2023 to CURRENT
KERNELiOS Cybersecurity Academy Brooklyn, NY
Collaborated with faculty and staff to create meaningful learning experiences.
Mentored and advised students to explore career pathways based and amplify knowledge, skills and strengths.
Participated in conferences and professional development opportunities to stay up-to-date with latest trends in field.
Evaluated and revised lesson plans and course content to achieve student- centered learning.
EDUCATION 12
Edward Murrow High School, Brooklyn, NY
CERTIFICATIONS
The OFFICIAL Cyber Security Summit, March 23, 2023. New York U.S. Agency for international development, USAID, cyber security Hackathon, June10, 2022
FORBES choice, 2021
GYSTB, The Global Youth Science and Technology Bowl, 2021 SCoula Digitale, Department of Computer Science - University of Pisa, “ Turing International Contest “ 2021
LANGUAGES Georgian
Native or Bilingual
Russian
Elementary
English
Full Professional