Learn more about me
Here are some of my contact details for your convenience. For additional information, you can visit
I am a professional Sr.Offensive Security Engineer from Myanmar. I have experience in various roles, including Mentor, Instructor , Cloud Security Engineer, Content Creator , and Security Researcher. My diverse background and dedication to security make me a valuable resource for your convention.
Happy Clients
Projects
Hours Of Support
Awards
Check My Resume
Experienced and results-driven Senior Offensive Security Engineer with over 5 years of hands-on experience in designing, implementing, and managing advanced security solutions for cloud environments and infrastructure. Demonstrates a proven track record of leading cross-functional teams, developing robust security architectures, and ensuring compliance with industry standards. Adept at conducting comprehensive risk assessments, implementing effective security controls, and optimizing environments for maximum security and operational efficiency..
University of Technology (Yatanarpon Cyber City) , Mandalay, Myannmar
Computer science is the study of computers and computer systems, encompassing their physical components and practical applications. It's an interdisciplinary field that integrates principles from mechanics, engineering, and logic to explore a diverse array of topics, such as -> Algorithms and data structures , Software and hardware design and development , Artificial intelligence , Information , Automation , Security , Data analysis , Computational , Theory .
MMS One Stop IT Solution, Yangon, Myanmar
A web developer is a professional who specializes in designing, building, and maintaining websites and web applications. Their primary focus is on the technical aspects of creating functional and user-friendly websites that meet client or organizational needs. Key responsibilities of a web developer typically include , Front-End , Back-End , Database , esting and Debugging , Version Control and Deployment ,Security .
COMPU TECH ICT Institute , MICT Park, Hlaing Township, Yangon.
Studied C++ from 2020-2021 at Computer Technique schools, gaining a strong foundation in object-oriented programming, algorithm design, debugging, and memory management. Proficient in developing efficient and high-performance software solutions
Alison , Learning Platforms
The risks that cyber threats pose are more common now that we have become almost fully reliant on online technologies. This diploma course explains how such threats exploit cyber security flaws to cause financial loss, sensitive data breaches and threats to national security. We discuss the many safeguards and technologies used to protect computer servers, mobile devices, cloud services and data. Sign up to master information security.
Cyber Insights Forum - CIF , Yangon ,Myanmar
As the Founder and Director of Cyber Insights Forum (CIF), you will lead the strategic vision and growth of our cybersecurity company. Your role encompasses setting organizational goals, driving innovation in cybersecurity solutions, and ensuring the successful delivery of our services. You will oversee all operational aspects, including team management, client relations, and business development, while fostering a culture of excellence and collaboration within the company.
AyarCloud , Dagon Township ,Myanmar
As a Senior Offensive Security & Cloud Security Engineer, you will play a pivotal role in safeguarding our cloud infrastructure by proactively identifying vulnerabilities and mitigating risks. You will lead red team exercises, conduct penetration testing, and collaborate closely with cross-functional teams, including Network, System, and SOC teams, to enhance security posture. Your expertise in offensive security strategies, cloud security best practices, and advanced threat analysis will be essential in developing robust security measures, conducting vulnerability assessments, and driving the overall security strategy of our cloud environments.
Remote, NCC , New York
One Cloud Technology , Alone Township ,Myanmar
As a Cloud Infrastructure System Engineer, you will be instrumental in designing, implementing, and managing our cloud infrastructure to ensure robust, scalable, and secure cloud solutions. You will work closely with cross-functional teams to optimize cloud environments and enhance overall system performance. Your role involves configuring and maintaining cloud services, managing infrastructure automation, and ensuring the reliability and security of our cloud resources.
MMS IT , Hlaing Township ,Myanmar
As a Course Instructor, you will be responsible for delivering high-quality educational content and training in cybersecurity and cloud technologies. You will design and develop comprehensive course materials, conduct engaging and informative classes, and assess student progress to ensure effective learning outcomes. Your role involves staying updated with the latest industry trends and technologies to provide relevant and cutting-edge education to students.
Dev o'Clock , Yangon , Myanmar
As a Founding Member of Dev o'Clock, you will play a critical role in shaping the direction and growth of our organization. Your responsibilities include contributing to the strategic vision, developing innovative solutions, and driving the core initiatives of the company. You will collaborate with other founding members to establish company values, build a strong team, and ensure the successful launch and evolution of our projects.
Gh0st InfoSec Security , New York , United States
As a Senior Cyber Security Instructor at Gh0st InfoSec Security, based in New York, you will be responsible for leading advanced cybersecurity training and education programs. You will develop and deliver comprehensive training materials, mentor students, and ensure that participants gain in-depth knowledge and practical skills in cybersecurity. Your role involves staying at the forefront of cybersecurity trends and threats to provide cutting-edge education and prepare students for real-world challenges.
Offensive & Defensive Security Services
Conduct comprehensive and realistic attacks against an organization’s security defenses. Simulate sophisticated threat actor tactics, techniques, and procedures (TTPs) to test the effectiveness of security measures and incident response.
Perform controlled attacks on systems, networks, and applications to identify vulnerabilities and weaknesses. Provide detailed reports with exploitation findings, risk assessments, and recommendations for remediation.
Execute simulated social engineering attacks such as phishing, pretesting, and baiting to assess the susceptibility of employees and organizational practices. Evaluate the effectiveness of employee awareness and response mechanisms.
Develop and test custom exploits to uncover vulnerabilities that are not identified by standard tools. Assess the impact and risk of these vulnerabilities to provide actionable insights.
Simulate advanced and persistent threats to evaluate the organization’s ability to detect and respond to sophisticated attacks. Use multi-stage attack scenarios to mimic real-world adversaries.
Assess physical security controls through methods such as tailgating, access card testing, and facility infiltration. Evaluate the effectiveness of physical security measures and procedures.
Coordinate and execute exercises where Red Team performs simulated attacks, and Blue Team defends against them. Enhance both offensive and defensive capabilities through collaborative exercises and feedback.
Test the security of network infrastructure components, including routers, switches, and firewalls. Identify configuration issues and potential security gaps that could be exploited by attackers.
Perform security assessments on web and mobile applications to identify vulnerabilities such as SQL injection, cross-site scripting (XSS), and insecure configurations. Ensure applications are secure against potential attacks.
Assess the security of wireless networks, including Wi-Fi, to identify vulnerabilities and unauthorized access points. Test encryption and authentication mechanisms.
Utilize automated tools to simulate attacks and measure the effectiveness of existing security controls. - Provide insights into potential weaknesses and areas for improvement.
Utilize threat intelligence to inform and guide Red Team activities, ensuring that simulations reflect the latest threat landscape and adversary tactics.
Monitor and manage security events in real-time using SIEM tools and technologies. Analyze alerts, perform incident triage, and coordinate responses to security incidents.
Provide expert support during and after security incidents, including containment, eradication, and recovery. Conduct root cause analysis and develop remediation strategies.
Identify, assess, and prioritize vulnerabilities within systems and applications. Implement patch management and vulnerability remediation processes.
Implement and manage threat detection tools and techniques to identify and respond to security threats. Continuously monitor for suspicious activities and potential threats.
Develop and enforce security policies and procedures to guide organizational practices and ensure compliance. Update policies to address emerging threats and regulatory changes.
Design and manage network security solutions, including firewalls, intrusion detection/prevention systems, and secure network architectures. Implement network segmentation and access controls.
Deploy and manage endpoint security solutions such as anti-virus, anti-malware, and endpoint detection and response (EDR) systems. Monitor and protect endpoints from potential threats and attacks.
Implement encryption solutions to protect sensitive data in transit and at rest. Ensure compliance with data privacy regulations and best practices.
Conduct training sessions to educate employees about security best practices, phishing prevention, and threat awareness. Foster a security-conscious culture within the organization.
Ensure that security practices comply with regulatory requirements and industry standards. - Conduct risk assessments and implement risk management strategies to address potential security risks.
Develop and maintain disaster recovery and business continuity plans to ensure rapid recovery from security incidents or disruptions. - Test and update plans regularly to ensure effectiveness.
Integrate security practices into the DevOps pipeline to enhance the security of software development and deployment. - Implement automated security testing and monitoring throughout the software development lifecycle.
Implement and manage security controls for cloud environments (AWS, Azure, Google Cloud). - Ensure compliance with cloud security standards and best practices.
Assess and secure APIs against vulnerabilities and threats. - Ensure secure API design and implementation practices.
Manage and secure user identities and access permissions. - Implement IAM policies and controls to protect sensitive resources.
Deploy and manage DLP solutions to prevent unauthorized data access and exfiltration. - Monitor and control data movement within and outside the organization.
Evaluate and review the design of security architectures to ensure robustness against threats. - Provide recommendations for improving security posture.
Gather and analyze threat intelligence to stay informed about emerging threats and vulnerabilities. - Provide actionable insights and recommendations based on threat analysis.
Conduct forensic analysis and investigations to determine the cause and impact of security incidents. - Gather and preserve evidence for legal and compliance purposes.
Implement and manage security automation tools to streamline security operations and improve efficiency. - Develop and deploy automated responses to common security threats.
Assess and manage risks associated with third-party vendors and service providers. - Ensure third parties meet security requirements and standards.
MY FREE CERF
Contact Me
Arthar Waddy Street,Alone Township,Yangon
rev3l4infosec@gmail.com
+959675196229