Home
Jobs
Companies
Network
Sign up or Log in
Teams
Join team
Hide
System
Settings
About
Wikipedia, la enciclopedia libre | Icebreaker
Wikipedia, la enciclopedia libre
la enciclopedia de contenido libreque todos pueden editar.
2 members
Contact info
Link
es.wikipedia.org
Members
Verified Only
User Icon
Joaquin Martinoia
•
3rd+
I am someone who prioritizes effective communication and collaboration in every project. Throughout my career, I have learned to quickly adapt to changing environments and face challenges with a problem-solving and positive attitude. My ability to work both independently and in diverse teams has allowed me to successfully collaborate with professionals from different disciplines and cultures. I value excellence in everything I do and always strive for improvement, both professionally and personally. My focus is always on continuous learning and exceeding expectations with creative solutions that bring real value.
User Icon
Pablo S.
•
3rd+
💎💻𝗛𝗮𝗯𝗶𝗹𝗶𝗱𝗮𝗱𝗲𝘀 𝘆 𝗰𝗼𝗻𝗼𝗰𝗶𝗺𝗶𝗲𝗻𝘁𝗼𝘀: Python, Bash, Java, Javascript, GraphQL, Powershell, BBDD, SQL, Networking, Microservices, E-Mail (Postfix - M365 - Gsuite), Linux, Mac, Windows, Power BI, Tableau, Paquete Office, EDR, SIEM, FW (OSSIM - WAZUH - Cortex XDR, Nagios, DataDog, FortiSiem, Imperva, etc.), Honeypots, Virtualización (VB, VMware, QEMU, ProxMox, OpenVZ), Cloud (GC, Nextcloud, Azure, AWS, Aviatrix) Metodologias ágiles y documentación (Scrum, Jira, Kanban, Trello, Monday, HubPlanner, Confluence, etc.) Mindmaps (Xmind - MindMap), Repositorios, y control de versiones (Github, Gitlab, Bitbucket), Docker, Kubernetes, Terraform, Ansible, CI/CD (Jenkins - Gitlab). Hacking tools and techniques (Open sources and professionals), Ingeniería social e intrusión física (piggybacking, dumpster diving, baiting, tailgating, impersonation, etc.), Front-End and Back-End technologies, SOAP, JWT, SAML, Federation, API testing. Manejo de secretos, DevSecOps / SecDevOps etc. 🔐𝗦𝗲𝗴𝘂𝗿𝗶𝗱𝗮𝗱 𝗶𝗻𝗳𝗼𝗿𝗺á𝘁𝗶𝗰𝗮: VAPT - MASPT (SAST - DAST - IAST) en entornos Web, Mobile, API, docker, Cloud, Wifi, Network y físicos (Human devices) - IVR systems, OWASP Code Review (PHP - Java - Javascript - .NET) - OWASP CheckList - SDLC - SCA - Shift Left Security - CIS Benchmarks Control - Hardening - Top Down and Botton Down Security - CTF Player (HTB - HackerOne - PortSwigger) - BugHunter (Private and Public programs) - OSINT investigator & Social Engineer (Phishing, Smishing, and Vishing campaings). SOC operations (Investigation over security incidents). Dark Web analysis. 📝𝗠𝗲𝘁𝗼𝗱𝗼𝗹𝗼𝗴í𝗮𝘀: OSSTMM, MSTG, WSTG, OWISAM, PTES, ISSAF, OpenSAMM, ASVS, MASVS, BSIMM, Microsoft SDL. SCA, STRIDE, VAST etc. 👮🏻𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲: ISO 2700[1,2,17], NIST 800-[15,53], OWASP TOP 10, SANS TOP 25, CERT C, PCI-DSS, BCRA 4609, 6017, 6375, GDRP, RFCs, CSF, CSMA, COBIT, ITIL, SOX, Wassenaar. etc. 🔎𝗣𝗲𝗿𝗶𝗰𝗶𝗮𝘀 𝗶𝗻𝗳𝗼𝗿𝗺á𝘁𝗶𝗰𝗮𝘀: Procedimientos, RFC 3227, Habeas Data, Leyes 25.326, 27.401, 26.388. Convenio de Budapest. etc. 📊 𝗔𝗻á𝗹𝗶𝘀𝗶𝘀 𝗱𝗲 𝗿𝗶𝗲𝘀𝗴𝗼𝘀: OWASP Risk Assessment, CVSS, FODA, PESTEL, Método Mosler, Análisis Reisz. 💪🏻𝗦𝗲𝗴𝘂𝗿𝗶𝗱𝗮𝗱 𝗙í𝘀𝗶𝗰𝗮: Defensa Personal: TKD - KAPAP - CPO, Humint, Tecnología aplicada a la seguridad. etc. 👋🏻𝗛𝗮𝗯𝗶𝗹𝗶𝗱𝗮𝗱𝗲𝘀 𝗦𝗼𝗳𝘁: Idiomas (Inglés C1 - Ruso A2, Portugues A2, Italiano A2, Chino A1), Gestión de equipos, Liderazgo, Negociación y comunicación efectiva, Design Thinker, Adaptabilidad, Trabajo en Equipo, Responsabilidad, Pensamiento Critico. CNV, PNL. etc.
Previous Page
1
Next Page