Cyber Eng

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

~OELFRANKO

Cyber Security Engineer


.'!/l [email protected] .) +966 0538037476 Q Riyadh, Saudi Arabia
11:1 https://www.linkedin.com/in/joel-franko-a969
8123b

WORK EXPERIENCE CAREER OBJECTIVE


A seasoned IT professional passionate about Cyber
IT Technician Security, Computer Networks and software
AI-Badher National development, seeking a software engineer role. Eager
ii March2024· Q Yanbu. Saudi to apply my skills which will contribute to the
current Arabia company's engineering efforts.
Maintaining the Software and Hardware for the Company, more than 2 sites.
Installed IP camera system in one of the company's site, using NVR and latest IP
cameras.
Resolved 10+ instances of Hardware issues.
EDUCATION
Resolved 20+ instances of software issues, saving around 10000SAR as software resolve Bachelor of Technology
fee.
Computer Science and Engineering
Recommended Cyber Security solutions, to Strengthen their security by 25%.
Specialisation in Cyber Security and Digital
Forensics
Android Application VAPT Intern VIT Bhopal University
THECYBERHOST ii 2020-2024
ii August 2023 - September Q Delhi, Q Madhya Pradesh. India
2023 India
Relevant courses
Tested and submitted more than 5 android application VAPT reports.
Vulnerability Assessment and Penetration Testing
• Did 25+ manual testing of the Vulnerabilities.
Cyber Security
• Explaining 7+ VAPT report to the customers.
• Data Structures
Computer Networks

PROJECTS
Vulnerability manager SKILLS
Security Analyst Cyber Security
ii 2023-2023 VAPT
• Installed and configured Nessus Essentials to perform credentialed vulnerability scans IDS
against Windows 10 Hosts. Firewall
• Implemented Vulnerability Management Function on sandbox networks: (Discover, Security frameworks
Prioritise, Assess, Report, Remediate, Verity)
• Conducted vulnerability assessments with Nessus: remediated vulnerabilities
• Python
Java
Effective Multitask Deep Learning for loT Malware Detection Computer Networks
lntercard
and Identification Using Behavioural Traffic Analysis
MySQL
Developer
Microsoft 360
ii 2023 - current
• To do a research on the malwaredetection in loT devices.
Researching about Deep Learning & machine Learning Algorithms to detect the malware
in the loT devices. CERTIFICATIONS
Implementing the System Design and CNN, LSTM+CNN, LSTMalgorithms and analysing
the report. Certified Ethical Hacker (CEHv12)
Running the system in the dataset, CNN and CNN+LSTMgot 95% accuracy In the IBM Cybersecurity
dataset.
Implementing the system and Developing the application.

You might also like