Ashley C.
Details
Computer information systems /network security
ECPI University
2013 : 2015
•Implementing vulnerability management and security testing practices and methodologies using common security testing and analysis tools (Metasploit, Kali, Wireshark)
•Leveraging knowledge of system, application, and database hardening techniques and practices .
•Identifying ,validating , and remediating security vulnerabilities
•Triaging vulnerabilities and delivering findings to clients
•Generating vulnerability scans/ reports and validating the issues identified
•Driving ulnerability management best practices
•Designing and deploying vulnerability identification programs and providing remediation guidance to the end users.
•Testing, calibrating and deploying scanning tools in new and complex environments
2022 : Present
Cisco
Information Security Engineer
•Operating and maintaining the vulnerability management tools to ensure confidentiality, availability , integrity and efficiency
•Implementing vulnerability management and security testing practices and methodologies using common security testing and analysis tools (Metasploit, Kali, Wireshark)
•Leveraging knowledge of system, application, and database hardening techniques and practices .
•Identifying ,validating , and remediating security vulnerabilities
•Triaging vulnerabilities and delivering findings to clients
•Generating vulnerability scans/ reports and validating the issues identified
•Driving ulnerability management best practices
•Designing and deploying vulnerability identification programs and providing remediation guidance to the end users.
•Testing, calibrating and deploying scanning tools in new and complex environments
2019 :
Cisco
Information Security Architect
• Penetration testing processes and methodologies, against Windows and Linux targets
• Vulnerability Assessment of Networks
• Vulnerability Assessment of Web Applications
• Advanced Exploitation with Metasploit
• Performing Attacks in Pivoting
• Web application Manual exploitation
• Information Gathering and Reconnaissance
• Scanning and Profiling the target
• Privilege escalation and Persistence
• Exploit Development
• Advanced Reporting skills and Remediation
2019 : 2019
eLearnSecurity
eLearnSecurity : Certified Professional Penetration Tester Student
• Learning Fundamentals of networking and penetration testing.
• Establishing essential penetration testing processes and methodologies
• Learning Vulnerability Assessment of Networks
• Learning Vulnerability Assessment of Web Applications
• Learning Exploitation with Metasploit
• Learning Scanning and Profiling the targets
2019 : 2019
elearnsecurity
eLearnSecurity : Junior Penetration Testing Student
• Managing Prompt Resolutions to global customers and partner service requests in a highly secured environment.
• Provides External Support for Vulnerability Management, PCI, Policy Compliance, Web Application Scanning, API, Malware and new Information Security services
• Maintain in-depth knowledge of Qualys products and information security best-practices
• Help customers understand vulnerability scan results, system audits, and/or log events and provide clear, concise, and actionable information to quickly resolve issues
• Recreate customer software issues in a lab environment for engineering assessment
• Use remote troubleshooting techniques to troubleshoot and correct issues
• Collaborate effectively and efficiently with other TSEs to solve difficult issues
• Ensuring that each customer interaction is friendly and professional experience that addresses the needs of the customer in all stages of the customer service life cycle within Qualys.
• Work closely with Customer Service, Engineering, Finance Sales, alliances and operations to ensure high levels of customer satisfaction with all transactions.
• Continually review personal performance metrics to ensure goals are consistently met
2018 : 2019
Qualys
Technical Support Engineer
Skills
Burp Suite, Customer Service, FedRAMP, Hydra, John the Ripper, Kali Linux, Metasploit, Nikto, Nmap, OWASP ZAP, Penetration Testing, Qualys, Reporting & Analysis, Security Audits, Team Building, Team Leadership, Technical Support, Tenable.io, Tenable Nessus, Threat & Vulnerability Management, Training, Troubleshooting, Vulnerability Assessment, Vulnerability Management, Vulnerability Research, Vulnerability Scanning, Web Application Security
About
Passionate, self-Driven Information security professional with the ability to perform authorized penetration testing, vulnerability Scanning, and reporting to enhance systems, mitigating threats & vulnerabilities .
Specialties
• Extensive experience with core Vulnerability management scanners: Qualys, Nessus, OpenVAS used to find system and web application vulnerabilities
• Experience with Web application Scanners: Qualys, Burpsuite, OwaspZAP, Dirbuster, Hydra, Nikto
• TCP/IP and HTTP and web technologies
• Essential penetration testing processes and methodologies
• Basic Vulnerability Assessment of Networks
• Basic Vulnerability Assessment of Web Applications
• Exploitation with Metasploit
• Simple Web application Manual exploitation
• Basic Information Gathering and Reconnaissance
• Simple Scanning and Profiling the target
**Passions: All things Cyber Security