Jacob Vukobrat

Student at SecureSet
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Milwaukee, Wisconsin, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Student
      • Jan 2021 - Present

      CORE Program: Full time student 20-week course Application Security- OWASP Top 10, XSS, CSRF, CORS, SQLi, Fuzzing, Command Injection, DoS & DDoS, Vulnerability ScanningCryptography- Stream & Block Ciphers, OpenSSL, Certificate Management, Symmetric and Asymmetric, Cryptography, CryptocurrenciesGovernance, Risk and Compliance (GRC)- Frameworks, Tools, Artifacts (Strategy, Policies, Standards, Guidelines and Procedures), Risk Management, Business Continuity, Incident Response; Plans and policies concerning GRC requirements including HIPAA, PCI-DSS, NIST 800-53, FedRAMP, Cyber Kill Chain, and FISMANetworking - OSI & TCP/IP Models, Hardware, Routing, Protocols, Encapsulation, Framing, NAT Networks, VLANsNetwork Security- Wireshark & Wireshark Filters, Port Forwarding, VPNs, Port Scanning, Bind & Reverse Shells, IDS/IPS, Firewalls and WAFs, Rule Writing, Vulnerability Management, MITM Attacks, DNS SecurityLogs and Detection- Splunk, SIEMs, IoCs, Log Types, Databases, Normalization, Regular Expressions, (RegEX), Hunting, Alarms & Reports, Investigations, User and Process MonitoringThreat Intelligence- CTI Sources and Methods, Threat Actors, Social Engineering, CTI Cycle and Process, Cyber Kill Chain, CTI Diamond Model, Cyber Mission Analysis Security Culture- CIA triad, Risk Management Principles, Risk Assessment and Analysis, Security, Metrics, Performance MeasuresStrategy and Analysis- Strategic Planning, Leadership, Operational Design, Decision Making CycleSystems- VMs, x86/ARM Architecture, Linux, Windows, Memory, Storage, Python, Cloud, Systems Administration- Windows, Unix/Linux, VyOSSystems Security- OWASP Secure Coding Practices, Input Validation, Session Management, Encoding, Debugging, Buffer Overflows, Code Injection, Cloud Security Infrastructure, Hypervisors

    • United States
    • Law Enforcement
    • 1 - 100 Employee
    • Operations NCO
      • Feb 2020 - Present

      • Verified soldier identification and access to sensitive information while serving as an Operations Clerk• Administrator rights in DTMS in a Company-sized element to update and keep track of soldiers online personnel tracked files(Company Lead)• Administrator rights in DTS(level 5) in a Company-sized element to sign and push forward for higher signatures on soldiers travel vouchers in the company(Company Lead)

    • UAV Operator
      • Sep 2015 - Feb 2020

      • Operational experience with the Shadow 200 RQ7B Drone• Technical troubleshooting experience with Shadow 200 RQ7B Drone

Community

You need to have a working account to view this content. Click here to join now