Work Experience
Education
Hard Skills
Soft Skills
Projects
CRM app
Konecta CRM is a customer relationship management application that allows users to manage and track interactions with clients effectively. This project provides features for user registration, login, and managing employee data.
Minstagram
Minstagram is a full-stack photo-sharing application developed using React, TypeScript, Material UI, Firebase, and Firestore. This application allows users to register, upload, like, comment on, and report photos.
Network-IT
Network-IT is a web platform that connects IT professionals seeking community, collaboration, and career opportunities, especially for those relocating. It offers a central hub for users to network, join local groups, share opportunities, and access insights into the tech landscape of their new locations.
PYME Registration
A full-stack web application consisting of a frontend built with Angular and a backend built with .NET. The application allows users to register with their company details, including NIT, email, phone number, and password. Upon successful registration, a JWT token is generated and stored in session storage for subsequent authentication.
Courses & Certificates
- E
Ethical Hacking Certified Associate (EHCA)
CertJoin
The Ethical Hacking Certified Associate (EHCA) badge certifies your foundational knowledge in ethical hacking. It serves as evidence of your comprehensive understanding and technical proficiency to conduct penetration testing on an organization's computer infrastructure. By earning this badge, you demonstrate your capability to identify vulnerabilities, assess potential risks, and implement effective security measures to protect sensitive information and ensure the integrity of computer systems. - G
Google Cybersecurity Professional Certificate
Coursera
Include hands-on, practicebased assessments and are designed to prepare them for entry-level roles in cybersecurity. They are competent in beginner-level Python, Linux, SQL, Security Information and Event Management (SIEM) tools, and Intrusion Detection Systems (IDS). They know how to identify common cybersecurity risks, threats, and vulnerabilities, as well as the techniques to mitigate. - E
Ethical Hacking (Red, Blue & Purple Team)
UdeCataluña
Understand the concepts, types, and phases of Ethical Hacking. Learn about tools, techniques, and methodologies that help identify vulnerabilities and information security flaws within an organization, with a focus on professional ethics. Define offensive and defensive security as represented by highly sought-after roles in the industry (Red, Blue & Purple Team).
Contact me
Feel free to drop a message for any opportunities or inquiries!
Or send an e-mail directly.