+$15,000 Are you looking for your next job? Let our headhunters help you Go >

Trivedi Aakash39777

Headhunter
Icon employee 0 candidates
Icon cup 0 interviews
Icon health 0 offers


Experienced with different Hardware technologies along with hands-on experience in CLI environments Technologies and Tools used during Professional Experiences/Projects, and Personal Projects. OS: Linux(Kali Linux, Parrot, Ubuntu, Arch, Black Arch, Redhat 4-7), Backtrack, Windows (XP, 2007-08-10) Tools: Nmap, Wireshark, Burp Suite, SQL-map, Social Engineering Toolkit, Metasploit Project, ZAnti, Aircrack-ng, Airmon-ng, Airodump-ng, John the Ripper, WPScan, Lynis, RainbowCrack, Ettercap Technologies: RFID, Keyloggers, MAC, Rootkits, Circuit Boards, Processors, Vulnerability scanners, Botnets, Phishing, DoS/DDoS, Brute Force, Sniffing/Snooping, Cookies, UI Redress/ClickJacking, Browser hijacks, Trojans, Exploitations, Databases, Servers, Bluetooth Network: TCP/IP, HTTPs, Security Protocols and Algorithms, FTP, IPv4, Content Delivery Protocols, Wireless Protocols, Mobile wireless internet protocols, OSI Model, Encryption/Cryptographic algorithms, Distributed/Decentralized Network Algorithms Open to talk about different domains > Cyber Security > IT Staffing > Technical Support > Technical Training

Job Change Assistance:

Send your profile to this experienced headhunter for help in landing a new job or negotiating higher pay

Chat with Trivedi Aakash



Completed jobs (0)


Are you a Recruiter/Headhunter?

Get access to 2,000+ Headhunting job orders

Join us as A headhunter

Are you an Employer?

Thousands of headhunters ready to help you

Join us as an Employer