This is Hilary SHI, head of public relations of Cyber Security Lab (China).
As a major partner of practically all cyber security conferences (such as China Internet Security Conference) and events in China, we would like to be a bridge channeling individuals and groups between domestic and overseas.
Our interests:
a: Join our cyber security think tank as paid consultant.
We are looking forward to experts in the following areas.
1.0day and 1 day Exploits.
[login to view URL] attack, intruding LAN, elevation of privilege, attack tools development.
[login to view URL] methods, encryption algorithms,and etc.
[login to view URL] Forensics.
b: Invite qualified professional experts and talents to China to participate in cyber security conferences held in China for keynote speech, sub-forums, summit dialogues.
We will cover the cost of your attendance fees, flight tickets and accommodation as host.
c: Promote advanced cyber security achievement transformation in China.
No matter you are individual or a company, should you be interested in us, please don’t hesitate to contact us.
Cyber security specialist with experience in cloud computing and private corporate security systems. Training includes intrusion management and threat detection for API systems and Cyber threat intensive training. Past work experience includes not only high-security environments, but also with low-security network systems open to the public. When it comes to cyber security, my ethic is that making more secure systems for everyone makes cyber security easier for the largest stakeholders in the technological arena.
Work Experience
Cyber Security Specialist
Techinvadors
2017-present
• Provide analysis and strategic recommendations to the API security group.
• Tasked with implementing code-based solutions as adopted by the committee.
• Coordinate with other specialists to deliver completed solutions within project time frames.
• Produce written documentation of each major security issue corrected by the team.
Skills
• Knowledge of current best practices, including best practices for application programmable interfaces
• Extensive experience evaluating and discerning malignant traffic patterns that could signal an imminent data breach
• Proficient written and verbal communication skills
• Knowledge of network protocols and common programming languages used in interactive online environments
• Detail-oriented approach to process analysis designed to reveal contributing causes to complex systems.
Hi
My name is Randy, I'm a Cybersecurity expert based in Costa Rica. My usual schedule is from 7 am to 9 pm GMT-6 but I can be flexible as needed.
I'm very interested in your project, I'm skilled in what you are looking for, feel free to ping me to discuss more details about the project.
I will be glad to assist you with your request. You can ask for my LinkedIn for reference.
Any questions let me know.