Invite Freelancer to Project
You don't seem to have an active project at the moment. Why not post a project now? It's free!Post a project
digitaloffensive Online Offline
- 90%Jobs Completed
- 100%On Budget
- 100%On Time
- N/ARepeat Hire Rate
Powershell automated acuentix web scannercode
Website Analysis & Website Vulnerabilities Tester
“I'm not sure what to say... It's what I wanted but better than I expected... Digitaloffensive is a PRO! Excellent work! I will hire him again for future projects.”UndertakerzZz 4 years ago.
Computer Security/IT Consultant for Trust Seal Business
“Mike was absolutely great to work with. He has been with us every step of the way and explained everything very carefully until we understood what we were getting. He gave us constant attention and quick responses to questions when needed. He also tries to help you save money and is very practical. Definitely recommended!”jarvisprojectsk 4 years ago.
Certified US Based Pentester (Whitehat)
“Young US Based test of Pen-testers, delivered as agreed on time, and as expected.”oregonbuyer 5 years ago.
virus removal from web site
“Very professional. Delivered exactly what he promised. Great communicator . Highly recommended I could not ask for a better service, will use again without a doubt.”tonyvillast 5 years ago.
security risk of VPN, Citrix, OWA time out
“Very professional. Delivered exactly what he promised. Great communicator and asked the right questions to deliver world class result. Highly recommended.”hak2cz 5 years ago.
Phone Numbers Forwarded to Central Sales Office
“Very reliable and diligent provider. Understood what was needed and went above and beyond to provide great solutions.”greedysteve 5 years ago.
Enterprise Security AdministratorFeb 2007
Provide enterprise security guidance and leadership to assure the protection of ePHI and Lancaster Generals electronic assets. oPreformed a risk assessment to determine current strengths, weaknesses and to define Lancaster General's acceptable risk. oAnalyzed firewall logs for anomalies to help pinpoint rouge machines, access points, spy ware and other malicious desktop behavior to ensure the integrity of our internal network. oResearch evolving threats and new security regulations to help La
Senior Security EngineerMar 2006 - Apr 2007 (1 year)
Provide third level technical support for SunGard's Managed Firewall and IDS security service offerings such as Checkpoint, Netscreen, Cisco Pix firewalls, and ISS. Responsible for identifying customer issues, troubleshooting, determining root causes, design and coordinating resolutions using a variety of applications and tools. oPlanned, implemented, and managed SunGard's firewall management infrastructure for Checkpoint Provider1, Netscreen Security Manager, and Cisco Security Manager allow
Bachelors1997 - 2001 (4 years)
Certified Information Systems Security Professional (2008)nternational Information Systems Security Certification Consortium, Inc., (ISC)²
The CISSP was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Organization for Standardization) Standard 17024:2003. CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement. For your CISSP credential, your professional experience has to be in two or more of these 10 (ISC)² CISSP domains:SC Magazine * Access Control * Application Development Security * Business Continuity and Disaster Recovery Planning * Cryptography * Information Security Governance and Risk Management * Legal, Regulations, Investigations and Compliance * Operations Security * Physical (Environmental) Security * Security Architecture and Design * Telecommunications and Network Security
GIAC Certified Incident Handler (GCIH) : Hacker Techniques, Exploits & Incident Handling (2007)SANS
Information Security and VoIP Articles
- Facebook Connected —
- Preferred Freelancer —
- Payment Verified —
- Phone Verified —
- Identity Verified —
- Email Verified