Profile of Proxy Bower

Proxy Bower Vulnerability, Recovery expert, Translation and Localization Professional
12 years experience 15 projects worked USA
$120.00 /hr
Computer HackerCorporate MailCredit RepairDatabase HackerPhone Hacker

Certified Ethical Black Hat that offers an outstanding customer service and fully detailed results. Expert in PHONE HACK (iOS, Android) FUNDS RECOVERY (Binary Options), DELETION of unwanted messages/posts. Vast experience in exposing just about anything, check me out.

Work History (15)

Work Experiences

  • Vulnerability Officer

    Interac CA

    March 2008 - August 2014

    Conducted network penetration tests and implemented vulnerability assessments.
    Evaluated operational effects of security system attacks.
    Analyzed and resolved vulnerabilities in relation to automated networks.
    Prepared and documented test plans for security evaluations.
    Designed and updated reports about security of targeted systems.
    Developed training programs and trained ethical hackers.
    Participated in courses for password cracking and attack technologies.
    Supported and administered security of intranet systems and networks

  • Digital service intern


    May 2007 - March 2008

    Automated and executed penetration tests for builds.
    Participated in understanding of security practices and standards.
    Generated and reviewed reports relating to testing software packages.
    Conducted investigation of client requests to understand product security.
    Formulated and executed requirements to implement security tests.
    Provided assistance in vulnerability evaluations and penetration testing operations.
    Implemented detection of attacks in coordination with network defenders.
    Administered software applications by identification of security malfunctions.


  • Certified Ethical Hacker (CEH) V10

    EC Council

    April 2014 - April 2014

    Information security overview
    Information security threats and attack vectors
    Ethical hacking concepts
    Information security controls

  • GIAC Penetration Tester


    July 2011 - July 2011

    Cyber defence and ICS
    Pen testing
    Digital Forensics and incident response
    IT security

  • Offensive Security Certified Professional


    January 2009 - January 2009

    Active Directory Attacks
    PowerShell Empire
    Introduction to Buffer Overflows
    Bash Scripting
    Passive Information Gathering
    Win32 Buffer Overflows
    Privilege Escalation
    Client-Side Attacks
    Web Application Attacks
    Port Redirection and Tunneling
    The Metasploit Framework

  • Foundstone Ultimate Hacking


    June 2015 - July 2015

    Advanced network reconnaissance including stealth scans and identification of services running on non-standard ports
    Monitoring switched networks using arp spoofing and other techniques
    The dangers and detection of covert channels are explored using ICMP, UDP, TCP and HTTP protocols
    SQL hacking methodologies
    Advanced UNIX® configuration techniques
    Compilation and test of malicious Linux® Kernel Modules
    Client-side Attacks

  • SEC575 Mobile Device Security and Ethical Hacking


    May 2016 - May 2016

    Dynamic Mobile Application Analysis and Manipulation
    Device Architecture and Application Interaction
    Static Application Analysis


  • Computer and Information science

    California Institute of Technology

    September 2001 - June 2005

    A Computer Science Graduate Certificate that provided me with a solid course of study in the mathematical foundations of computing as well as important aspects of computer programming, database security, algorithm, Artificial intelligence and Data computation.

  • Master of Information and Cybersecurity

    UC Berkeley

    January 2006 - February 2008

    Here I learnt data and information security for public and private sectors.