Jarryd S.

IaaS Support Engineer Trainee at QuoVadis Group
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
BM

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Firewall Administration Essential Training
    LinkedIn
    Mar, 2023
    - Nov, 2024
  • Penetration Testing Active Directory
    LinkedIn
    Apr, 2022
    - Nov, 2024
  • Networking Foundations: Networking Basics
    LinkedIn
    Nov, 2021
    - Nov, 2024
  • Penetration Testing: Advanced Tunneling and Exfiltration
    LinkedIn
    Nov, 2021
    - Nov, 2024
  • eJPT (eLearnSecurity Junior Penetration Tester)
    eLearnSecurity
    Oct, 2021
    - Nov, 2024
  • Offensive Security Certified Professional (OSCP)
    Offensive Security
    Jul, 2019
    - Nov, 2024
  • Unix Badge
    PentesterLab
    Jan, 2019
    - Nov, 2024
  • Introduction Badge
    PentesterLab
    Oct, 2018
    - Nov, 2024

Experience

    • Bermuda
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • IaaS Support Engineer Trainee
      • Aug 2021 - Present

    • Penetration Tester
      • Aug 2021 - Present

    • United Kingdom
    • Business Consulting and Services
    • 1 - 100 Employee
    • Penetration Tester & Offensive Security Consultant
      • Aug 2020 - Present

    • Instructor
      • Aug 2020 - Aug 2020

      Gave a talk about Ethical Hacking, and Penetration Testing during the 'Career Taster Camp' held by The TLC Group. Covering different topics such as:- What is Hacking/Ethical Hacking?- Types of Hackers- How to get started- Basic Hacking/Networking Terminologies & Attacks - What is Penetration testing?- Types of Pentests - Methodologies for different types of Assessments- How to go from 0 to root on a machineAs well as common tools, and more. For each of these 2 courses I provided a live demo to show the students what real world hacking looks like, what attackers can do, and how they could secure themselves from certain types of attacks. Show less

    • United States
    • Computer and Network Security
    • 700 & Above Employee
    • Bug Hunting
      • May 2019 - Jan 2020

      Occasionally helped friends hunt on different bug bounty programs. Occasionally helped friends hunt on different bug bounty programs.

    • Bermuda
    • Government Administration
    • 700 & Above Employee
    • TA Systems Clerk
      • Dec 2017 - Dec 2018

      Managed the handling of Files and Documents, as well as making sure they were updated and saved in perpetration of the new system which was soon to be implemented.

    • Systems Administartor Work Shadow
      • Jun 2018 - Jul 2018

      I was given the opportunity to shadow an IT Administrator, and gained knowledge on: - The networking involved in a corporate setting- Basic Networking Technologies - Importance of people skills- How to work with Windows AD- Setting up and managing printers - Web Development & Security

    • United States
    • E-learning
    • 1 - 100 Employee
    • Counselor
      • Jun 2017 - Jul 2017

      Taught Kids (from ages 10-16) the fundamentals of Computer Programming through various fun activities, and games. - Covered over the programming language coffeescript - Created worlds compatible with VR - Programmed a robot using Spheros to travel through mazes the kids designed Taught Kids (from ages 10-16) the fundamentals of Computer Programming through various fun activities, and games. - Covered over the programming language coffeescript - Created worlds compatible with VR - Programmed a robot using Spheros to travel through mazes the kids designed

    • Insurance
    • 1 - 100 Employee
    • Intern / Work Shadow
      • 2016 - 2016

      I was given the opportunity to work shadow the Validus' Security Team, and got a first hand look of what is needed to be done In the day to day of an Information Security Professional. I was given the opportunity to work shadow the Validus' Security Team, and got a first hand look of what is needed to be done In the day to day of an Information Security Professional.

Community

You need to have a working account to view this content. Click here to join now