Victor Olawoyin

Victor Olawoyin

$55/hr
Cybersecurity - Penetration Tester
Reply rate:
-
Availability:
Hourly ($/hour)
Location:
Toronto, Ontario, Canada
Experience:
2 years
About

A proficient cybersecurity analyst adeptly engaging in the practice of penetration testing on computer systems, networks, and applications. This entails the art of exploiting recognizable vulnerabilities, fashioning innovative testing methodologies to discern latent weaknesses, and conducting rigorous physical security evaluations encompassing servers, web applications, software, proprietary systems, and various network devices. Fueled by a fervent passion for these competencies, an aspiration to channel these proficiencies toward a position as a distinguished Penetration Tester within a reputable enterprise is fervently pursued. 

As a member of the security team, I was responsible for the following:

  •  Document findings and communicate their relevance efficiently
  •  Produce high-quality reports for both internal and external clients (on ad-hoc
  • basis)
  •  Work closely with the third-party development teams and act as a subject
  • matter expert on vulnerabilities and the best ways to mitigate them
  •  Help review, assess, and prioritize vulnerabilities coming from data points (third party penetration tests, static/dynamic application security testing tools,
  • public advisories, etc.)
  •  Contribute to the company's security culture by sharing your knowledge via
  • blog posts, presentations and engaging with the development community
  •  Stay current on the latest threats that could affect the company and share those
  • insights to the relevant parties in a timely fashion
  •  Conducting meticulous network penetration examinations, executed
  • comprehensive application assessment scans, and conducted scrupulous risk
  • assessment reviews.
  •  Delivered profound security intelligence insights, swift incident reports, and
  • orchestrated seamless log management for heightened security.
  •  Completing and analysing threat assessments.
  •  Scrutinized security event data from the network via Security Information and
  • Event Management (SIEM) tools.
  •  Investigating and evaluations of network traffic, adeptly deciphering logs,

 Perform code reviews and penetration tests to discover and exploit

Skills
  • Phython
  • Burp Suite
  • XSS
  • Metasploit
  • WireShark
  • Immunity Debugger
  • OWASP
  • Ethical Hacking
  • Vulnerability Assessment
  • PowerShell
Languages
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.