Friday, January 10, 2020


CYBERSECURITY   

ALEX J. ARIAS OBUCHOWICZ SIEKIEL WOJCHAWSKA LEIDA
 
I PROVIDE CONSULTANCY WHEN THE GREATEST ENEMIES IN A CYBERSECURITY INCIDENT ARE TIME, COMPLACENCY AND IGNORANCE. IF THEY ARE UNCONTROLLED THEY CAN DESTROY YOUR ABILITY TO MAKE INTELLIGENT DECISIONS. HELPING ORGANIZATIONS TAKE STEPS TO MITIGATE THESE RISKS AND THE DEFENSE IN-DEPTH NEEDED TO ENSURE MORE SECURE ENVIRONMENTS. IDENTIFYING AND ASSESSING THE SECURITY OF THESE BUSINESS- CRITICAL APPLICATIONS. / COLLABORATOR WITH " MANAGED SECURITY SERVICE PROVIDERS"/CYBERSECURITY AWARENESS / SPECIALIZED IN CONDUCT DIGITAL RECONNAISSANCE

 2024
AREAS OF EXPERTISE from 2010 - Present

Penetration Testing using UNIX-Kali-Linux tools, and others UNIX O.S
Protection motivation theory
Cybersecurity Awareness
Graphs and charts.
Databases MySQL & POSTGRESQL.& MDBs.
R-Studio.
Crypto-Currency
Programming Python 3.0
Dark web. Anonymity.
Privacy Policies and Backup Systems.-N.I.S.T (THE U.S.A)
Fundamental Data –Statistic- Analysis


EDUCATION AND CERTIFICATION
 
API Documentation U.S.A  University.apisec U.S.A -San Francisco Nov.2023
 
Cyber504x Network Security U.S.A Rochester Institute of Technology  July 2023
 
API Penetration Testing
 
Attack Methodologies in IT & ICS-210W-09_ -2023


Python 3.0 / Python for Everybody BY Charles Dr. Chuck Severance and advanced University of Michigan The U.S.A licensed under CC  Full University Python Course / 2021-Present
 
Remote Viewing Basics, (by Stacey Tallitsch) Udemy.com The U.S.A 2021-Present
 
Cybersecurity - analysis / OWASP  - Present

Network Security and CISCO-P.Tracer  2020 / - Present

Network Security // M.I.T - Present /

Cybersecurity courses white-hat ethical hacking / 2021- Present

Information security-Context and Introduction by University of  London & Royal Holloway / Coursera / 2021

Foundations of Data Analysis. / Austin Texas-edx.org / 2015

Introduction to Cybersecurity / The National Cybersecurity Institute at Excelsior / 2014

Designing and Executing Information Security Strategies.. University of Washington 2014

Computer Networks / University of Washington / 2014

English Certifications- Adult School / Certifications- Adult School

USA-M.Beach  / Finberg/Fisher ESOL Levels 1-2-3-4  1999 - 2001

Architecture degree /  U.B A 17/12/1989


LANGUAGES

SPANISH : NATIVE

ENGLISH : B-2  and Advanced Practitioner / Cambridge assessment level

WRITTEN & SPOKEN 23 Years VIDEO-CONFERENCING 12 Years 7,500 hs


EXPERIENCE

ARGENTINA -Buenos Aires /  2018-Present
Buenos Aires Information technology. Security Analyst.Clients remain in a private domain.

Description of duties and achievements
Cybersecurity-based on Kali Linux Operating System. 


G.L.G GROUP  --- 2018-Present
GLG is an exclusive network of executives and industry experts

ARGENTINA-Buenos Aires--/ 2005-Present

IDASP.COM.AR

 Founder of idasp.com.ar an Interactive Data Service Pages.

 International Consultant working on international clients
from UK, The U.S.A, Germany, Norway, Canada, Netherlands,
Australia, Japan, among others.

# A 5 year experience working on legal analysis of commercial
litigation in the Province of Bs.As

Statistic Data analysis on idasp.com.ar getting a
measurable- quantifiable result throughout 8 years.

G.L.G GROUP / 2015-Present
GLG group Councils Member/International Consultant.
 GLG is an exclusive network of executives and industry experts.He interacts with executives at leading companies all over the world by suggesting about subjects of his expertise.

Lived and worked in:

VENEZUELA-Caracas / 2007-2007 
 
ARGENTINA - Buenos Aires- from November 2003 / 2003-2007 
 
THE U.S.A-Miami -December 10,1998 to November 20,2003 / 1998- 2003 
 
VENEZUELA-Caracas -October 27 1997 to December 10,1998 1997- 1998 
 
PARAGUAY-Asuncion-October 22,1996 to December 1996 / 1996-1997 
 
PERU-Lima - August 16,1995 to August 16,1996 / 1997-1994 
 
ARGENTINA-Buenos Aires / 1984-1994


ALEX J. ARIAS OBUCHOWICZ SIEKIEL WOJCHAWSKA LEIDA