englishflag-icon  hungarianflag-icon


- IT Security vulnerability scanning, penetration testing, "white hat hacking", cyber security, development operations and network security, web application security, threat/vulnerability management, digital forensics and data recovery   
- IT infrastucture system design and architect1   
- Reverse proxy, firewall, content-filtering, load-balancing2   
- Bash shell-, Python-, Expect scripting, Ansible automation   
- Virtualisation, jails/containers, cloud computing (GCE, DigitalOcean, AWS)   
- Building WiFi and cable networks, internet access points3    

(1 - Debian GNU Linux/FreeBSD OS 2 - HAProxy/Squid/Riverbed 3 - 10Gb/s or 1Gb/s or 100Mb/s)
References Intersoft logo  Feromon logo  Huntrans logo adamholes.com mail server logo rackspace logo flybe logo pizza.de logo esma logo

CompTIA logo