Imej profil bluebird008
Ahli semenjak 12 Mei 2018
0 Cadangan


Dalam Talian Luar Talian
I have over 10 years of experience in cyber security where I have advised many companies and persons around the world, assuring security on big projects. Also , I've designed and developed secured sites for almost 8 years now. In that time I had several full time jobs working for various roles as tech support, building apps, fixing computers . Skills: ★HTML,CSS ★Python ( Django , Wagtail, Plone, Django-CMS) ★PHP ( Wordpress ) ★Bash/ Shell scripting ★Full Stack Web development ★Dark Web Investigation ★Kali Linux ★Parrot Security OS ★Tails OS ★WhonixOS ★Penetration Testing ★Vulnerability Assessment ★Wireless Security ★Network Security ★Mobile Security ★Ethical Hacking ★Reverse Engineering ★Exploit Creation ★GDPR Consultancy & Compliance Assessment ★ISO/IEC 27001 Compliance Audit ★PCI DSS Compliance ★Network Traffic Analysis ★Web automation and scraping ★Malware Analysis ★MySQL, SQLite
$25 USD/hr
4 ulasan
  • 100%Kerja Diselesai
  • 92%Mengikut Bajet
  • 92%Tepat Pada Masa
  • N/AKadar Ulang Upah

Portfolio Items

Ulasan Terkini

  • Imej Bergen D. Phishing Email $70.00 USD

    “He is very professional and hard worker.”

  • Imej David N. Unique and Creative spin for IT company $170.00 USD

    “KMZ was eager and energetic and a pleasure to work with. He was able to communicate and execute effectively making our project run smoothly. I highly recommend his services”

  • Imej Tony Y. Teach me how to use a computer $24.00 USD

    “Task completed, will work with him again.”

  • Imej A B. Network Security, Network and Devices Analysis €50.00 EUR

    “Hazan has delivered a good service. He knew what he was doing, He was patient enough to answer all questions related to the project. He was also giving information to avoid same issue in the future.”


Project Verifier

Jul 2018

"TySeven"​ - troubleshooting company which will solve any your problem in any ​life sphere: 1. Business. 2. Politics. 3. Regional development. 4. Solution of unconventional problems. 5. Military defense. 6. Help of a single-skilled expert. 7. Recruitment services (HR). 8. Find a product or a service. 9. Find a job. 10. Personal counseling: a change of lifestyle; personal growth (mentoring); family issues; relationship format issues, etc

CEO & Senior Penetration Tester

Feb 2018

1. Train Administrative Assistants in customer service and other office procedures. 2. Organized office transition from paper invoices to Quickbooks and online invoicing. 3. Creates the right policies and strategies that will lead the direction of the firm. [login to view URL] the right management personnel and delegates certain responsibilities to them for the benefit of the firm. [login to view URL] and negotiates with high level clients on behalf of the firm

Security Consultant

Apr 2015 - Mar 2016 (11 months)

My Job is to: 1. conduct security audits of web applications; 2. implementing security controls (audit code, scanning for vulnerabilities, and the like); 3. interact with the developers and service managers to eliminate vulnerabilities; to act as a consultant and a customer of the new functionality related to information security; 4. to participate in research.

Web Automation Engineer

Feb 2013 - Mar 2015 (2 years)

I was in charge of: 1. development of solutions to improve testing speed of products 2. development / refinement of systems of automated testing based on Selenium aid developers in the organization and support of automated testing at the level of Unit, API and component testing 3. development / refinement of functional auto-test


Aircraft & Helicopter Engineering

2012 - 2017 (5 years)

Russian Language & Culture

2011 - 2012 (1 year)

Certified Accounting Technician

2009 - 2011 (2 years)


2008 - 2011 (3 years)


Certified IT Security Specialist (2016)

IT Security Academy

Security and Hacking Myths Debunked Beginner to Advanced IT Security Microsoft Windows Threats and WiFi Weaknesses Current Black-Hat Threats and Trends Designing More Secure Networks Encrypted Data, Identify Spoofing, and Windows Authorization

Certified Ethical Hacker (2016)

Hacking School

Ethical Hacking Bug Bounty Hunting : Web Application Penetration Testing Ethical Hacking & Cyber Security Tools and Techniques Windows Operating System Hacking Account Hacking Techniques Open Source Intelligence Network Hacking and Security Metasploit Extreme on Kali Linux Access Darknet Black Market Using TOR Cyber Crime and Forensics Investigation Mobile Phone Hacking and Tracking

Complete Cyber Security Course (2017)

Station X

Mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats. Security, privacy and anonymity online from hackers, corporations and governments.

Full Stack Web developer (2012)


Full stack web development with HTML, CSS, Javascript , Bootstarp, Python , Wordpress , SQL , PHP.


The Insider's Guide to Hacking

Basic introduction about cyber security.


  • Facebook Disambung
  • Freelancer Keutamaan
  • Bayaran Disahkan
  • Telefon Disahkan
  • Identiti Disahkan
  • E-mel Disahkan

Kemahiran Teratas Saya

Cari Freelancer yang serupa