20+ years IT expertise in system engineering, security analysis, solutions architecture. Proficient in OS (Windows, Linux, Unix), programming (C++, Python, HTML/CSS/JS, Bash), DB (MySQL, Oracle, MongoDB, PostgreSQL). Skilled in scripting (PowerShell, Python), DevOps (microservices, containers, CI/CD), web development (Node.js, React, Angular). Successful track record in managing IT systems.
API Security OWASP
Dec 2022 - Present · 5 mos
Wallarm: API Security Leader by G2
San Francisco, Bay Area, Full Time, 7 yrs 11 mos
2020 - Nov 2022 · 2 yrs 11 mos
Information Technology Administrator
2017 - 2020 · 3 yrs
2015 - 2017 · 2 yrs
Information Technology Administrator
2010 - 2013 · 3 yrs, Full Time
Full Time, 8 yrs 1 mo
Senior System Engineering
2005 - 2009 · 4 yrs
2001 - 2005 · 4 yrs
- Knowledge of operating systems: Windows, Linux, Unix
- Experience with network protocols (TCP/IP, DNS, DHCP, FTP)
- Database operations: MySQL, Oracle, MongoDB, PostgreSQL
- Knowledge of the main principles of building and configuring IT systems, including experience with virtualization, cloud services and monitoring
- Security awareness (IDS/IPS, Anti-virus, EDR), understanding of ITIL, ISO 27001.
- Knowledge of scripting languages: PowerShell, Python
- Microservice architecture
- Containerization and orchestration: Docker, Kubernetes, AWS ECS/EKS
- Rest API development
- Web application development technologies: Node.js, React, Angular
- CI/CD and Automation Deployment skills
- Protection against cyber attacks and vulnerabilities
- Development of API protection measures
Information Security System Professional (CISSP)
Issued Jan 2014 · Expired Jan 2015
Microsoft Certified Professional
MCP Field Of StudyComputer/Information Technology Administration and Management
Issued Jan 2003 · Expired Jan 2005
More from the author
Get tips on how to protect yourself from tailgating attacks on our webpage. Don't let hackers gain access to your sensitive information. Stay safe today!
Rainbow Table Attack
Discover how malicious hackers use rainbow tables to crack passwords. Learn how to protect your accounts with strong password protection.
RADIUS (Remote Authentication Dial-In User Service) protocol
Discover the workings of the RADIUS protocol, a widely-used authentication and authorization method for network security. Enhance your knowledge today!
Generic Routing Encapsulation - GRE
Understand the importance of GRE (Generic Routing Encapsulation) by exploring its definition, uses, and benefits. Elevate your networking knowledge today.
API Security Testing
Discover the importance of API security testing and how it helps ensure the protection of your most valuable data. Experts share their insights here.
Protect your website from malicious attacks by understanding HTML injection. Stay safe by learning how it works and ways to prevent it.
Digital Forensics and Incident Response
Discover the critical importance of DFIR (digital forensic & incident response) in protecting your organization from cyber threats.
User Datagram Protocol
Learn how User Datagram Protocol works, its benefits, and differences from other transport layer protocols. Discover its use cases and more!
Discover how to protect your web applications from cross-site request forgery with CSRF tokens. Learn the basics and how to implement them effectively.
OWASP ZAP - Zed Attack Proxy
OWASP Zed Attack Proxy (ZAP) is a free, open-source web application security scanner that helps identify vulnerabilities and security issues. Use it today!
WebAuthn - Web Authentication
WebAuthn can help you securely authenticate users without having to enter passwords. Learn about the benefits and implementation tips
Protect your network from the Kerberoasting attack with advanced detection techniques. Learn more about this critical vulnerability now.
Living off the Land Attack
The Living off the Land attack is a stealthy method used by hackers to carry out attacks, leveraging legitimate system tools and processes to avoid detection.
Downgrade attacks - a type of cyber attack that can compromise your security systems. Protect your digital assets today.
Wallarm Security Platform
Solutions by Cloud
Solutions by Industry
188 King St. Unit 508,