Convidar Freelancer para Projeto
Parece que você não tem um projeto ativo no momento. Por que não postar um projeto agora? É grátis!Publique um Projeto
- 79%Trabalhos concluídos
- 71%No Orçamento
- 22%Taxa de Recontratação
Integrate 3CX with Zoho Desk
“He is very knowledgeable in many different technologies. I work with him on a variety of projects. Highly recommended!”Jason S. há 8 meses
Build SOAP To Connect PHP/MySQL to QB Web Connector
“He is a talented and dedicated developer. Highly recommended! [06 March, 2019] Very talented freelancer, highly recommended”Jason S. há 8 meses
Raspberry Pi External USB Modem Configuration
“He knows what he is doing. Solved many issues for us on this project. Will use again for phase 2 of project.”Jason S. 1 ano atrás
Increase DataStore on VMware box Hard Drive already isntalled
“If you read this review. Do not let Do's quiet way of chatting fool you. I have been in network for 20 years. I have hired many Engineers. I am an Engineer myself . We are extending our team and took a chance with Do. The project was harder than we both thought. I even loss faith and brought many other people to look at it. None of them! Could figure it out or do the job. Do was confident and knows what he knows. He is also personable and what we wanted most of all communication. Any good review would not give Do justice. He also helped us out with a very good client. --- I will be hiring him as much as I can .”Shneur G. 1 ano atrás
Project for Do N.
“Let him work on my computer when I was away so that the next day it was all fixed up .”Randy T. 1 ano atrás
“good , fast , smart .”M A. 1 ano atrás
System penetration testingDec 2016
I have a big responsibility in protecting the information system (computer network, Voice IP network, data). I'm a leader of a security group who have to implement solutions to protect our IT system, such as: update devices, implement security configuration, do penetration testing all IT devices in our IT system.
Application SecurityMay 2014 - Dec 2016 (2 years)
In this period of time, I do application penetration. The purpose of my work is to find security vulnerabilities in applications (desktop applications and web applications) and fix them.
Network SecuritySep 2012 - Apr 2014 (1 year)
I worked as a security expert who implemented solutions to protect the computer network of my organization (install Firwall, IPS, IDS, Antivirus, Security Policies, NAC System, CA System). I also do task of a network administrator.
Network AdministrationOct 2011 - Aug 2012 (10 months)
In this period of time, I worked as a network administrator. In more detail, I install Servers (AD, DC, Database Server, Web Server, File Server, Proxy Server, Mail Server), config network devices (Cisco Router, Cisco Switch, Load Balancing devices, Wifi Access Point) and monitor the status of all devices in our network.
Web DevelopmentJul 2010 - Aug 2012 (2 years)
AlgorithmMay 2010 - Oct 2011 (1 year)
Solve Complex problems in Algorithm.
Software DevelopmentJun 2008 - Jul 2010 (2 years)
In this year, I worked as a coder. I wrote a lot of software and tools in .NET (C#, VB NET), C, C++.
52005 - 2010 (5 years)
First_Prize (2008)Vietnam Association for Math Processing & Ministry of Education and Training
Second_Prize (2009)Vietnam Association for Information Processing & Ministry of Education and Training
Second_Prize (2010)Vietnam Association for Information Processing & Ministry of Education and Training
CCNA (Cisco Certified Network Associate) (2013)Cisco
CCNA (Cisco Certified Network Associate) is an information technology (IT) certification from Cisco. CCNA certification is an associate-level Cisco Career certification. ... Passing the ICND1 grants one the Cisco Certified Entry Networking Technician (CCENT) certification.
Cisco Certified Network Professional (CCNP) (2014)Cisco
Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program. This certification is aimed at full-time network or system administrators, or those who work with local and/or wide-area network (LAN/WAN)infrastructure.
Certified Ethical Hacker (CEH) (2015)EC-Council
Certified Ethical Hacker (CEH) is a qualification obtained by assessing the security of computer systems, using penetration testing techniques.
ACM ICPC (International Collegiate Programming Contest) (2010)ACM (Association for Computing Machinery)
The ACM ICPC (International Collegiate Programming Contest) is a sport programming world championship held annually
- Conectado com o Facebook
- Telefone Verificado
- Identidade Verificada
- E-mail Verificado