|
Resume alert |
Resumes 1 - 10 of 156 |
Columbus, OH
... Perform a successful spoofing attack on a Metasploitable machine using Kali Linux tools: • Conducted comprehensive scans with Python and Nmap to gather data on target system's open ports, services, and OS version, enhancing vulnerability ...
- Jun 03
Columbus, OH
... AREA OF EXPERTISE Database Management Security & Authentication Java Spring Boot Git ReactJS Camunda AWS Services Maven Agile Code reviews Unit testing PMD testing EC2 instances AWS Cloud Practitioner Vulnerability Testing User Authentication ...
- May 21
Lewis Center, OH
... Demonstrated expertise in vulnerability management, utilizing Qualys scan reports to identify and remediate potential threats across all AIX/WebSphere environments. Provided support for IBM Workload Scheduler v9.5, ensuring the stability of its ...
- May 21
Columbus, OH, 43215
... Writer, researcher, social media specialist Created, managed, and maintained Early Risers, an income-generating online lifestyle blog, including brand representation, sponsored posts, product reviews, lifestyle and encouragement advice, and ...
- May 02
Lewis Center, OH
... (Numeric and Non-Numeric) usage programmatically inside DatCard Research Cloud then generates the aggregated query document using Bson Document API where input data feed from researcher provided scenario-based data from DatCard Gateway Interface. ...
- Apr 21
Gahanna, OH
... Conducted regular security audits and vulnerability assessments, addressing security gaps to identify and mitigate potential vulnerabilities. Monitored and analyzed application logs using tools like ELK and Kibana to troubleshoot issues and optimize ...
- Apr 11
Columbus, OH
... Direct experience in network engineering and administration, identity and access management, security administration, vulnerability assessments, incident response, control testing, and SOX, PCI DSS, NERC, and FISMA auditing. CORE COMPETENCIES CISA ...
- Mar 16
Columbus, OH
... Updated the APIs with Spring Actuator management endpoints to avoid the vulnerability and to provide security to the code. Created Data Collectors, Time series, Monitors in Metrics center for the low volume and High-volume devices and checked the ...
- Mar 15
Columbus, OH
... Perform vulnerability assessment of information systems to detect deficiencies and validate compliance using the POA&M tracking tool. •(CSAM) Request scans and later review the scan results for common vulnerabilities such as missing patches, weak ...
- Mar 11
Columbus, OH
... Security Analyst for Johnson and Johnson/Kenvue 2022- ● Conduct comprehensive penetration and vulnerability assessments to identify vulnerabilities and weaknesses in our application portfolio by using tools such as Qualys, Snyk, Owasp Zap. ...
- Jan 07