Profile of tutanota.tech

tutanota.tech Professional Hacker for hire!! Moneyback Guaranteed
13 years experience 12 projects worked USA
$90.00 /hr
Computer HackerCredit RepairGrades Change ServicePhone HackerSocial Media

My services are very discrete and I guarantee 100% success,

After trying my service, if you’re not satisfied in any way, simply ask for a full refund immediately. You will receive full refund with NO QUESTIONS ASKED!  I  offer such an ironclad guarantee because of absolute confidence in my services. You have absolutely nothing to lose here. You have everything to gain!

Work History (11)

Work Experiences

  • Technical Officer

    United States Department of Defense

    March 2012 - February 2015

    Automated and executed penetration tests for builds.
    Participated in understanding of security practices and standards.
    Generated and reviewed reports relating to testing software packages.
    Conducted investigation of client requests to understand product security.
    Formulated and executed requirements to implement security tests.
    Provided assistance in vulnerability evaluations and penetration testing operations.
    Implemented detection of attacks in coordination with network defenders.
    Administered software applications by identification of security malfunctions.

  • Vulnerability Officer

    Google Inc

    February 2015 - April 2018

    Conducted network penetration tests and implemented vulnerability assessments.
    Evaluated operational effects of security system attacks.
    Analyzed and resolved vulnerabilities in relation to automated networks.
    Prepared and documented test plans for security evaluations.
    Designed and updated reports about security of targeted systems.
    Developed training programs and trained ethical hackers.
    Participated in courses for password cracking and attack technologies.
    Supported and administered security of intranet systems and networks.

Certification

  • Certified Ethical Hacker (CEH) V10

    EC Council

    April 2006 - April 2006

    Information security overview
    Information security threats and attack vectors
    Ethical hacking concepts
    Information security controls

  • GIAC Penetration Tester

    GIAC

    October 2006 - October 2006

    Cyber defence and ICS
    Pen testing
    Digital Forensics and incident response
    IT security

  • Offensive Security Certified Professional CRISC

    CRISC

    February 2010 - February 2010

    Active Directory Attacks
    PowerShell Empire
    Introduction to Buffer Overflows
    Bash Scripting
    Passive Information Gathering
    Win32 Buffer Overflows
    Privilege Escalation
    Client-Side Attacks
    Web Application Attacks
    Port Redirection and Tunneling
    The Metasploit Framework

  • Foundstone Ultimate Hacking

    Black HAT

    April 2015 - April 2015

    Advanced network reconnaissance including stealth scans and identification of services running on non-standard ports
    Monitoring switched networks using arp spoofing and other techniques
    The dangers and detection of covert channels are explored using ICMP, UDP, TCP and HTTP protocols
    SQL hacking methodologies
    Advanced UNIX® configuration techniques
    Compilation and test of malicious Linux® Kernel Modules
    Client-side Attacks

  • SEC575 Mobile Device Security and Ethical Hacking SANS

    Harvard TECH

    June 2016 - June 2016

    Dynamic Mobile Application Analysis and Manipulation
    Device Architecture and Application Interaction
    Static Application Analysis
    Mobile Penetration Testing

Education

  • B Sc Information and Computer Science

    California Institute of Technology

    September 2005 - July 2008

    I am a guru in a field that emphasizes both computing and information science and engineering, upholding the strong association between the fields of information sciences and computer sciences and treating computers as a tool rather than a field.

  • Master of Science in Information Assurance and Cybersecurity

    Floroda Tech University

    September 2013 - July 2015

    I learnt how to use my use expertise in information assurance jobs to:

    Research and plan security strategies and carry out implementation
    Establish emergency protocols
    Monitor their organisation’s networks for security breaches, investigate the system when one occurs and respond to prevent further attacks
    Manage software installs, firewalls, and data encryption programs
    Conduct penetration testing and analyse the results to further improve safeguards in place
    Research the computer environment to be aware of threats and how to combat cyberattacks
    Manage a disaster recovery plan