Invite Freelancer to Project
You don't seem to have an active project at the moment. Why not post a project now? It's free!Post a Project
- 93%Jobs Completed
- 100%On Budget
- 100%On Time
- 14%Repeat Hire Rate
Project 12284985 has been deleted
“Dplazas work is professional and he knows whats his doing, he delivered the work within the time agreed, plus I requested lots of changes due to my specific requirements and he agreed to do and provided a better work. for sure will work with him again.”zakkd2020 1 year ago
Web Application Security Research Task - Runtime Application Self-Protection (RASP)
“I was happy with the result of this freelancer.”mariopirker 1 year ago
“Job done on time & budget - Thanks for the work.”serviceview 1 year ago
Project for dplazas
“he is good,,excellent,,patient,,,,,,one can trust him.........he just dont cares about the money....he is punctual............he is super cool..........he worked a lot for our project........................he has ton of patients.......................................................”rythmresin147 1 year ago
Write a Technical Report on Ethical hacking topic -- 2
“Excellent freelancer. Very professional and have firm grip on Cyber security. Definitely recommeneded”xFFFF 1 year ago
Cybersecurity Project for DPlazas
“David showed nothing but professionalism and was very polite and kind when it came to this Cyber Security Project. His skill set when it comes to this field of Network/Internet/Computer security is hands down the best in the field and I would highly recommend him to anyone looking for someone in this field. Will definately hire again AAAA+++”fak420 1 year ago
Security Information ConsultantOct 2014 - Dec 2015 (1 year)
Member of the Security Committee, where every company's project has to be evaluated in order to pass to production phase. Pentester of the company's web pages, servers and network. I'm coresponsible of the security in most of the decisions about making or deleting rules in at least 7 of the most important firewalls of the company. I'm responsible for the hardening manuals about *nix O.S. (Unix, HP-UX, Linux).
Logical Security SpecialistSep 2013 - Oct 2014 (1 year)
Substitute coordinator of logical security from April 2014. Ethical Hacking and Pentesting of IT platforms. Researcher to identify new vulnerabilities and the development or implementation of new security tools. Advanced analysis of logs. Implementing security services in real time correlation OSSIM logs. Teach courses on information security (ethical hacking) to technical staff. Support in the area of security to peer institutions from different countries like Colombia, Ukraine, Canada, among others. Responsible for the performance of 3 professionals in my charge.
Electronic Engineer2002 - 2006 (4 years)
Huawei Certified Network Associate (HCNA) (2014)Huawei Career Certification
This Certificate is equivalent to Cisco CCNA but practical knowledge is based on Huawei Devices. Certificate ID:010100100899805634931805 Valid Until:January 23,2017 It can be verified at: [login to view URL]!createNavi?navId=_43&lang=en More info: http://enterprise.huawei.com/ilink/cnenterprise/download/HW_148987&ei=YJupVO7gIMiVNpi1grAE&usg=AFQjCNHun3U0pgkXDSIxi_YgtKCJZ5Hczw&sig2=IGkASU7T0BdVKCx7yEXSFw
Diseño e implementación de un Capturador de Datos Web.
ISBN: 978-980-6400-27-6 The aim of this paper is to design a web data capturer through an electronic circuit connected to the INTERNET using hardware and software standards. The main goal is to make it work independently from a computer to access a variable data from a website on the Internet. This device rely on free hardware technology through the Arduino module and free software used to program the device and tryouts. The tests conducted showed the features of each device used and the integration of
Diseño e implementación de un dispositivo electrónico para el apagado remoto de servidores en función de la tensión de alimentación y temperatura.
ISBN: 978-980-6400-27-6 The aim of this article is to design a device that connects to any local address network through an electronic circuit using hardware and software standards. The main goal is to make it work independently from a computer in order to monitor the voltage on the power supply and the temperature of the computer room. Tests were conducted which showed the features of each device used and the integration of all parts in testing temperature variation and simulation of power failures, ach
US English Level 188%
- Payment Verified
- Phone Verified
- Email Verified