✤✤✤Looking an Opportunity in Network Security & Cyber security technical domain✤✤✤
✤Forensic investigation from formatted drives, death phones and Network attack.
✤Knowledge of ethical hacking, malware reverse engineering, and penetration testing.
✤Knowledge of application security threats and vulnerabilities (e.g. buffer overflow, mobile code, Cross Site Scripting (XSS), SQL injections, Broken Link Authentication, Session Hijacking, return-oriented attacks, malicious code).Planning Audits for Network Security Monitoring (NSM), network traffic analysis, and log analysis.
✤Planning Audits for Network Security Monitoring (NSM), network traffic analysis, and log analysis.
✤IP protocols in...