I'm

Luis Davila


Ethical Hacker

Profile

I'm an Ethical Hacker


About me

  • Security Analyst
  • Penetration Tester
  • Ethical Hacker
  • Information Security Consultant
  • Professional Member of the British Computer Society
  • Offensive Security Certified Professional (OSCP)
Pascal van Gemert

Details

Name:
Luis Alberto Davila
Age:
37 years

Experiences


Educations

CEUPE - European Postgraduate Center

Dec 7, 2022

MCIS - Master in Cybersecurity It provides students with the most complete knowledge in the digital area, from the basic principles of network protection, its evaluation and subsequent interpretation. Online

Offensive Security

Aug 30, 2022

Offensive Security Certified Professional (OSCP) Analyzing, correcting, modifying, cross-compiling, and porting public exploit code, and Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications Online

International Business Management Institute

Aug 27, 2022

International Politics Understanding the most important political concepts and systems, the ecosystem of international politics and global governance, and how decision are taken on an international stage Online

InfoSecurity

Jul 15, 2022

ISEC Infosecurity Caracas Provide Services, Solutions and Training in Information Security to clients, professionals, students and the community in general, generating relationships of trust between the parties that last over time. Venezuelan

Corporation Att C.A.

Oct 2017

Oracle certified associate Certification helps you build a foundational understanding of Java, and gaining this certification credential is the first of two steps in demonstrating you have the high-level skills needed to become a professional Java developer. Venezuelan

Corporation Att C.A.

May 2017

Microsoft Certified it Professional MCP a Certification of competencies offered by Microsoft, which accredits the skills of professionals and technicians in the application of the technologies of this manufacturer in business solutions for the company. Venezuelan

EC-Council

Dec 14, 2015

Computer Hacking Forensic Investigator provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies USA

EC-Council

Jun 24, 2013

Licensed Penetration Tester Use the tools you will need to scan networks, crack passwords, analyze and intercept traffic, discover code vulnerabilities, and compromise resources, Recognize vulnerabilities within a system, run exploits, and suggest solutions to a client to remediate the weak points, Work within a virtual environment to practice your pen testing skills, including using Oracle VM manager, Kali Linux, Metasploitable, and DVWA, Scope, plan, and execute a pen test engagement from start to finish. USA

CENEAC PRODUCTIONS - UCV

Feb 19, 2010

Course - CCNA Exploration: Accessing the WAN Configure and verify basic WAN serial connections including serial, Point-to-Point and Frame Relay, Describe the functions of common security appliances and applicaions and the practice to secure network devices UCV - Caracas

CENEAC PRODUCTIONS - UCV

Nov 25, 2009

CCNA Exploration: LAN Switching and Wireless Explain basic switching concepts and the operation and configuration of Cisco switches, Describe enhanced switching technologies such as VLAN's, VLAN Trunking Protocol (VPT), Rapid Spanning Tree Protocol (RSTP), Per VLAN Spanning Tree Protocol (PVSTP), and 802.1q UCV - Caracas

Machine Business

Sep 2009

WatchGuard Firewall Administration Workshop Apply network security controls and at the perimeter level, make requests to verify open ports, take network packet captures, apply filter rules to allow and block traffic with rules (ACLs) in the firewall. USA

CENEAC PRODUCTIONS C.A.

Jun - Sep 2009

Cisco Network Academy Program Covers the following areas: Networking, OS and IT, Programming, Internet of Things and Analytics, Infrastructure Automation, Cybersecurity and Packet Tracer. Venezuelan

EC-Council

Jun 20, 2009

EC-Council Certified Security Analyst Hacking and Penetration Testing training that is globally recognized in the cybersecurity world and covers the testing of modern infrastructures, operating systems and application environments while teaching students how to document and write pen-testing reports. USA

EC-Council

Nov 11, 2009

Bachelor of Computer Science Responsible for ensuring the design, development and total maintenance of automated data or information systems in the field of computer technology. USA

Foundation UCV

May 27, 2009

CCNA Exploration: Network Fundamentals Analyze the operations and features of the transport layer protocols and services, analyze the operations and features of network layer protocols and services and explain the fundamentals concepts of routing, build a simple ethernet network using routers and switches, use Cisco CLI commands to perform basic router and switch configuration and verificacion UCV - Caracas

EC-Council

Dec 15, 2008

Certified Ethical Hacker Set of the latest hacking tools used by pentesters and cybersecurity professionals, Focus on important areas of expertise under the NIST/NICE Protect and Defend (PR) framework, Updated Cloud and IoT modules to incorporate CSPs, container technologies like Docker and Kubernetes, Cloud Computing threats and IoT hacking tools like Shikra, Bus Pirate, Facedancer21, etc, New operating systems like Windows Server 2019, Windows Server 2016 and Windows 10 configured with domain controller, firewalls and vulnerable web applications to practice and improve hacking skills, Latest malware analysis tactics for ransomware, banking and finance malware, IoT botnets, OT and Android malware analysis. USA

Corporation Att C.A.

Oct, 2008

CISSP Proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities. Venezuelan

EC-Council

Informatic security Globally trusted IT security certification that covers essential principles for network security and risk management. Whoever has this certification verifies her knowledge to protect and secure a network against hackers. Venezuelan


Careers

Gonkar IT Security and cloud computing

2018-2020

Fulltime - Senior Penetration Tester London | https://gonkar.com/

Securisys C.A. & Grupo Ultimas Noticias

2014 - 2017

Fulltime - Head of IT Security Caracas | https://securisysnow.com/ | https://ultimasnoticias.com.ve/

BT Global Services

2011 - 2014

Penetration Tester London | https://www.globalservices.bt.com/en

Radio Mundial YVKE

Jul 2010 - Agu 2010

Penetration testing - contract Venezuelan | http://radiomundial.com.ve/

Bolivar Bank

Jul 2010

Penetration testing - contract Venezuelan

Baninvest, Investment Bank

Apr 2010 - Jun 2010

Penetration testing - contract Denmark | https://bankinvest.com/

Ministry for Planning and Finance

Dec 2008 - Dec 2009

IT Security Director Venezuelan

Ministry for Planning and Finance

Nov 2006 - Dec 2008

Security Analist Venezuelan

Ministry for planning and finance

Oct 2005 - Nov 2006

Systems analyst Venezuelan

Abilities


Skills

  • CEH
  • Penetration Testing
  • E Archving (message solutions)
  • CCNA
  • Certified Security Analyst
  • CISSP
  • VMware 3x-7x
  • ZEN
  • End User Support
  • Hyper-V
  • VOIP & Unified Comms
  • Citrix (VDI)
  • Forensic
  • UNIX (AIX, Solaris, HP-UX)
  • LINUX (Red Hat, Suse)
  • Web & Extranet Development
  • RMM (Kasyea, Barracuda)
  • Windows NT-2019
  • VMS
  • SAN (Nimble, HP 3PAR, Tintri)
  • MS Office
  • MS SQL & Oracle
  • Cisco 10S
  • SIEM (AlientVault/logRhyrm)
  • Auto Pentesting (PCysys, cronos)
  • SAN (NetApp, EMC, HDS)
  • Backup Exec, Arcserv
  • Cloud (AWS, Azure)
  • VOID (AVAYA, MS-teams)
  • CMS (Joomla, WordPress)
  • Troubleshooting & Resolutions
  • GDPR, NIST, PCI-DSS
  • Virtualization & Cloud
  • R Management (ILO, IDRAC)
  • Syndication
  • MDM (VMware AirWatch)
  • SAAS Solutions
  • E-Commernce
  • Infrastructure & Networking
  • ERP, Payroll, CRM, ECMS
  • Information Security
  • Message labs/Mimecase/Libra
  • Enterprise Storage
  • Data Centers
  • Business Contunity & DR
  • Virtualization (KVM, Hyper-V)
  • Firewall (Checkpoint, Fortinet)
  • SPLAT
  • MS Project
  • AV (McAfee, Bitdefender, Sophos)
  • Microsoft Exchange 2003-2019
  • Office 365
  • BSD
  • AWS
  • Azure
  • Novell Netware
  • SQL
  • OES
  • MySQL
  • DELL/HP Servers and storage Tintri
  • PCs
  • Servers
  • Checkpoint
  • Nimble
  • IDS
  • EMC
  • Switches
  • Routers
  • Supermicro Oracle
  • Perl
  • C
  • HTML
  • Java
  • TCP/IP
  • UDP
  • DB2
  • ICMP
  • IPSI
  • Data center operational support
  • Networking protocols and systems
  • Compilers
  • Shell scripting
  • Social networking technology
  • Wiki technology
  • Blog technology
  • Quest Netvault, Unitrends
  • POS System (IBM 4690 SurePOS, Wincor Nixdorf) and (rutinning Retail Java)
  • Vulnerability assessment tools and scripting routines
  • Firewall (WatchGuard)

Languages

  • Spanish (Mother Language)
  • English
  • French (Un petit peu)


Contact

Get in touch

Your message was sent, thank you!