Passionate trainer, speaker, player and consultant with domain of in Areas of Cyber Security, Incident Response, DevSecOps, CI/CD Automation, Bug Bounty Hunting, Assessment of Mixed Box with PTES, OSSTMM, OWASP, OSINT, NIST and MITRE standards & methodologies, Capture the Flag - CTF's, Vulnerability Management Solutions VMS's, Ethical Hacking, Serverless, Kubernetes, Docker, API's, Cloud Computing Multi-Vendor, Data Centers, Hybrid Infrastructure, Aix, Unix, Linux, Apple, Microsoft Operating Systems, Storage & Recovery Solutions, Networking, Virtualization, Migration, Disaster Recovery, ITIL, PMP, Project Management, CMDB Quality Assurance, ITSM Change & Problem Management, Suite Standard Reference Architecture SRA, LMS's, CMS's; Hosting.
As consultant and part of sales force, I participate as SME to respond to the Request for proposal (RFP), or do the Root Cause Analysis (RCA), business cases and contracts writer, contract management, vendor negotiation and oversight. Being strict on finding root causes and communicating potential solutions to organizational problems based, Design and provide solutions, with focus in improve and optimize IT infrastructure and the InfoSec service management quality, to assure the high availability, applying the best practices.
Results-driven with strong goal-orientation, deep experience in resilience, create and implement ideas that will become the new standards of the IT world, working in a cross-functional team, with a lot of a positive initiative, adventurous, competitive vision, empathetic, open-minded, can-do attitude and excellent written and verbal communication abilities.
Scan, Discovery, Exploit & Repeat
The security of the computer systems goes through a crucial moment, this talk will help you understand the challenges that Cyber Security demands. Israel will show you how to prevent and best practices. In addition, it will inform you of the opportunities that this industry offers.