Work with Information Security for over 3 years - alongside startups and medium-sized companies - providing advice on the practice of pen testing, code review, security architecture and training…
I have audited high profile websites for security vulnerabilities and have managed and worked in teams of software developers and computer scientists delivering high security architectures.
My work is focused on understanding threat models, analyzing existing applications and building intelligent tools to combat risk current and future security for both individuals or groups.
There are typically three ways to engage with me:
This is the process of identifying known vulnerabilities and vulnerabilities present in the environment and exposing them to threats. After performing the vulnerability analysis, you will receive a detailed report explaining all the vulnerabilities in your environment, as well as effective ways to mitigate such threats.
It is a real attack simulation, this is the best way to properly assess your security posture. Demonstration of exploitation and exfiltration of data not only helps the business to understand the risks, it also helps to prioritize the changes within the organization.
I can also conduct training for professionals in the Information Security segment, such as: awareness, use of tools and techniques.
Please get in touch: [email protected] / (19) 991 891 355