Remarkable experience in manual penetration and Web application testing. Profound knowledge of network architectures, operating systems, application software and cyber security tools. Huge knowledge of managing information assurance evaluation tests. Solid understanding of information security and applied cryptographic protocols. Proficiency in scripting, Unix operating systems and windows. Ability to exploit recognized vulnerabilities.