Freelancerı Projeye Davet Edin
Görünüşe göre şu anda aktif bir projeniz yok. Neden şimdi bir proje ilan etmiyorsunuz? Ücretsizdir!Bir Proje İlan Edin
- N/ATamamlanmış İşler
- N/ABütçe Dahilinde
- N/ATekrar İşe Alım Oranı
Pentester/ Security ConsultantJul 2014
-Penetration Testing, -Web Application Penetration Testing, -Mobile Penetration Testing, -Security Researching
Chief Information Security OfficerMay 2012 - Aug 2014 (2 years)
- Implement and coordinate information security policy of Can-Pack Group - Implement and coordinate business continuity management of Can-Pack Group - IT systems security monitoring, incident handling and response, - Auditing IT processes with regard to corporate security architecture standards, - Providing expertise on procedures concerning IT system’s security from the regulatory perspective (ISO/IEC 27001, ISO/IEC 22301),
IT Security ArchitectOct 2011 - Jun 2015 (3 years)
- Design of security architecture of legacy and new IT systems (applications and underlying infrastructure), Aviva Group (EMEA), - IT systems security monitoring, incident handling and response, - Providing expertise in terms of information security within business processes and projects. - Verification and approval of security risk analyses within IT projects, - Coordination and carrying out of penetration tests in AVIVA Group (EMEA),
Security Specialist/PentesterSep 2007 - Sep 2011 (4 years)
- constant evaluation of risks related to Bank's IT system, - providing expertise on new applications, network and systems solutions from IT perspective and taking part in testing new solutions, - securing, auditing and penetration testing of e-banking system, - providing expertise on procedures concerning IT system’s security from the regulatory perspective - creating and analysing reports related to threats detected by IDS and antivirus systems,
Security ResearcherSep 2006 - Jul 2007 (10 months)
Working as a security analyst I monitored 3 security related websites, news forums and mailing lists for vulnerabilities and security exploits information. - testing vulnerabilities and writing on exploits, - testing application for vulnerabilities: e.g. buffer overflow, format string, SQL Injection, XSS, and others, - analyzing information about vulnerabilities, exploits.
Security Specialist/PentesterApr 2004 - Sep 2006 (2 years)
- constant evaluation of risks related to Bank's IT system, - determination and implementation of methods and standards designed to protection of the network and Bank's IT system, - building security mechanisms for applications, systems and network, - providing expertise on new applications, network and system solutions from IT perspective and taking part in testing of new solutions, carrying out tests including penetration tests of the IT system,
Network security policy in ‘The Company’1999 - 2004 (5 years)
Certified Ethical Hacker #ECC930395 (2009)EC-Council
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
Certified Security Analyst #ECC938432 (2010)EC-Council
The Certified Security Analyst has practical experience with conducting realistic penetration tests. Thought by top experts in the field, he has advanced knowledge and experience regarding the available methodologies, tools and techniques which are required to perform comprehensive information security penetration tests.
C)SWAE - Secure Web Application Engineer (2012)Mile2
Certification learn how to detect various security issues with web applications and identify vulnerabilities and risks.
Lead Auditor ISO/IEC 27001:2013 (2016)IRCA
This certification learn how implement Plan-Do-Check-Act (PDCA) cycle within management systems and knowledge of Information Security Management principles, concepts and specifically the requirements of ISO/IEC 27001:2013. and also allows