Profile of Hack Knight

Hack Knight Hack Knight
17 years experience 7 projects worked USA
$70.00 /hr
Computer HackerCredit RepairDatabase AnalystDatabase HackerPhone Hacker

My services are very discrete and I guarantee 100% success,

After trying my service, if you’re not satisfied in any way, simply ask for a full refund immediately. You will receive full refund with NO QUESTIONS ASKED!  I can offer such an ironclad guarantee because of absolute confidence in my services. You have absolutely nothing to lose here. You have everything to gain!

Work History (7)

Work Experiences

  • Ethical Partner

    SRA International, Inc.

    June 2010 - February 2014

    Conducted network penetration tests and implemented vulnerability assessments.
    Evaluated operational effects of security system attacks.
    Analyzed and resolved vulnerabilities in relation to automated networks.
    Prepared and documented test plans for security evaluations.
    Designed and updated reports about security of targeted systems.
    Developed training programs and trained ethical hackers.
    Participated in courses for password cracking and attack technologies.
    Supported and administered security of intranet systems and networks.

  • Senior Hacker

    The SI Organization, Inc.

    June 2006 - February 2010

    Automated and executed penetration tests for builds.
    Participated in understanding of security practices and standards.
    Generated and reviewed reports relating to testing software packages.
    Conducted investigation of client requests to understand product security.
    Formulated and executed requirements to implement security tests.
    Provided assistance in vulnerability evaluations and penetration testing operations.
    Implemented detection of attacks in coordination with network defenders.
    Administered software applications by identification of security malfunctions.



    November 2004 - June 2006

    Develop partnerships across marketing, sales and product management across the company, across several business units
    In partnership with business units, identify a backlog of growth hacks to be audited and work with your partners to execute
    Supporting partners as they onboard onto the growth stack, so that they can run independently
    Help evangelize growth hacking, growth hacking learnings, and a culture of experimentation across IBM
    Experienced in Product Management or similar role
    Experienced in O to O/ RFID or internet Products
    Fluently speaking English and Mandarin



    April 2003 - November 2004

    Provide Information Security advice and guidance to project teams
    Support and advocate for the Enterprise Security strategy
    Be familiar with and excited by the growth hacking concept
    Prior tech startup experience
    Exceptionally strong quantitative, analytical, and problem solving skills
    Familiarity in major digital channels and tools such as email, display, social, search, SEO, A/B testing, etc
    Supports cortAIx exploitative growth within the Digital Business Unit and in relation with Digital Factory and TRT
    Establishes strong relationships with Business Lines (BL) to find and promote the best AI intensive MVPs and Regional MVPs
    Support digital transformation through AI training development in coordination with digital Academy


    Google, Inc

    March 2003 - April 2003


    New York, NY
    Growth, acquisition, or similar experience
    Strong technical knowledge and understanding of web/app software principles
    Strong knowledge of infrastructure and OS hardening techniques
    Security related qualifications CISSP, OSCP, OSCE highly sought after
    Seek out security vulnerabilities and configuration weaknesses within a diverse set of technologies used across YNAP
    Prepare, organise, deliver and report on security tests from start to finish
    Advise technical teams about security risks, and effective ways to remedy them
    Build strong and productive relationships with members of other teams across the business and between countries


  • Certified Ethical Hacker v.10 Online Course

    Harvard University

    June 2006 - May 2008

    Profound knowledge of networking technologies:
    Extensive technical knowledge of hacking tools:

    Symantec AV
    Familiarity with security operations:

    Information Security
    Adept in advanced hacking technologies:

    SGA Analysis
    Quick and excellent in security procedures:

    Firewall implementation
    Intrusion detection
    Data recovery
    Dexterity in server administration:

    Windows 200x Server
    Expertise in server architectures:

    SQL Server
    Immense abilities to:

    Understand software vulnerabilities and tool automation
    Apply data manipulation techniques and SQL client tools

  • Ethical Hacking


    September 2000 - May 2003

    Strong technical experience and skills in some of the following areas
    Demonstrate & experience exploiting common application vulnerability types (OWASP Top 10/SANS25): XSS, SQLi, RCE, Path Traversal, CSRF, XXE, etc
    Good report writing skills and the ability to communicate with stakeholders at all levels
    Coordinating with development teams to provide mitigation recommendations, education, and ensuring vulnerabilities are effectively fixed
    Experience in managing publicity campaigns using Google AdWords and other platforms
    Experience with viral marketing and measuring K-factor, Search Engine Optimization (SEO) and APIs (Mechanical Turk, Amazon API, AdWords API, social media APIs)
    Experience with common Operating Systems including: Linux, Windows, MacOS, Android, iOS