Profile image of qprotex
@qprotex
Member since November 6, 2008
8 Recommendations

qprotex

Online Offline
Senior Software Engineer / Reverse Engineer / Security Analyst / Penetration Tester / Ethical Hacker My technical skills and proficiencies include: ¬ Software Application Development: .NET (C#, VB.NET, F#), Python, PHP, Delphi ¬ Web Application Development: ASP.NET, Django, Ror, Laravel, CodeIgniter ¬ Mobile Development: Hybrid and Native using Xamarin, Phonegap, Firemonkey ¬ Reverse Engineering: OllyDbg, IDA Ghidra,, Remnux, Malware analysis, Binary Reversing, Firmware Reversing ¬ Software Security: Anti-piracy schemes, Anti-cracking, Software protection ¬ Vulnerability Testing: Vulnerability Assessment, Penetration Testing using Kali Linux, SamuraiWTF, ParrotSecurity, Remnux, Blackarch ¬ Hardware development: Arduino, Raspberry ¬ Data - Web Scraping: Scrapy, Scrapinghub ¬ Database Design: MySQL, Oracle, SQL Server, SQLite, NoSQL ¬ System Automation: Macros, AutoIT, Python Script
$75 USD/hr
158 reviews
7.7
  • 91%Jobs Completed
  • 96%On Budget
  • 92%On Time
  • 13%Repeat Hire Rate

Portfolio

Recent Reviews

  • image of Sergey V. Project for Miguel Angel F. $150.00 USD

    “Best Cyber Security Expert!!! I will definitely work with him in the future.”

  • image of Andres R. I have a documentation in Spanish, to make a "SOAP" integration. $400.00 USD

    “Wonderful programmer, Wonderful person, Miguel thank you very much !!”

  • image of Lisa N. Project for Miguel Angel F. $375.00 USD

    “I appreciate that Miguel takes the time to gain a very thorough understanding of a project. WIth over 350+ pages, he posed many thought provoking questions to ensure that every detail was covered. He was incredibly patient through the whole process.”

  • image of Ramon Y. Project for Miguel Angel F. €20.00 EUR

    “Excellent freelancer, very recommended!!”

  • image of Lisa N. Changes to Wordpress Portfolio style pages and media. $200.00 USD

    “Miguel is a professional through and through! If you are looking for someone who is incredibly knowledgeable in Wordpress, has great communication skills, responds in a timely manner, thorough and understands timeframes/deadlines, then I recommend Miguel. Not only did he make my life easier, he made the whole experience a breath of fresh air. Thank you for being an amazing freelancer.”

  • image of Kale M. Build an advanced spreadsheet system $1250.00 AUD

    “very efficient and competent”

Experience

Software Developer

Aug 2012 - Jan 2014 (1 year)

I worked as android software developer in the IT department. I was in charge of the android version of the main product of the company called GIM.

Education

Computer Science

2002 - 2007 (5 years)

Qualifications

CEH v6 (2010)

EC Council

The Certified Ethical Hacker is a professional certification, provided by the International Council of E-Commerce Consultants (EC-Council). An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system(s) or network(s) is not. A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.

Delphi Certified Professional (2008)

ExpertRating

ExpertRating is an ISO 9001:2008 company that offers hundreds of popular certifications suitable for students, professionals, job seekers and companies. See where ExpertRating Certified Professionals are working.

Certified Reverse Code Engineering Professional (2009)

IITAC

The Professional Level qualification is aimed at people involved in advanced Reverse Code Engineering. This includes people in roles such as protectionists, malware analysts, exploitation developers, testers, test analysts, test engineers, test consultants, test managers, user acceptance testers and software developers. This Professional Level qualification is also appropriate for anyone who wants an advanced understanding of Reverse Code Engineering.

Certified Reverse Engineering Analyst (2009)

IACRB

In order to pass the CREA, the candidate must reverse engineer the malware sample and submit a report within 60 days of passing the multiple choice portion of the exam. The report should contain the following details (if relevant to your malware sample): • General function and functionality of the malware • Behavioral patterns of malware • Local system interaction • Files and registry keys created, modified and accessed • Network behavior (including hosts, domains and IP addresses accessed) • Time and local system dependant features • Method and means of communication • Original infection vector and propagation methodology • Use of encryption for storage, communication • Use of self modifying or encrypted code • Any information concerning development of malware (compiler type, country of origin, author names/handles, etc.) Candidates should provide documented code samples to receive full credit for the above items. Candidates must score 210 out 300 points (70%) on the practical examination to complete the certification process and be awared the CREA certification.

Certified Associate for the Java Platform (2008)

Sun

The Sun Certified Associate for the Java Platform, Standard Edition certification exam provides an ideal entry into an application development or a software project management career using Java technologies. This worldwide credential validates basic knowledge of Object-Oriented Concepts, UML representation of OO concepts, the Java programming language, and general knowledge of Java Platforms and Technologies. Candidates for this certification include: Entry level Java programmers. Students studying to become Java programmers. Project or program managers working with Java technology in the software development industry.

Certified Delphi Developer (2015)

Embarcadero

The Delphi Certified Developer exam tests your general knowledge of Delphi programming concepts. You will be tested on language syntax, programming techniques, using the IDE, and database development. The test will identify you as a special member of the global Delphi community. Developers who use the study guide and have at least two years of Delphi programming experience should be able to pass the Delphi Certified Developer exam.

Security+ (2016)

CompTIA

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

SoapUI NG Pro (2018)

Smartbear

The SoapUI certification allows both SoapUI Open Source and Pro users to measure their proficiency with SoapUI by taking an online exam. Passing the exam makes you an officially Certified SoapUI User. As a Certified SoapUI User you have demonstrated your SoapUI knowledge and have set yourself apart as someone who has mastered the world's most comprehensive API testing tool.

Certifications

  • Numeracy 1
    90%
  • Preferred Freelancer Program SLA
    89%
  • C# 1
    87%
  • Spanish 1
    87%
  • Delphi Programming
    85%
  • US English Level 1
    83%
  • Computer Security
    82%
  • US English Level 2
    82%
  • WordPress
    80%
  • US English Level 3
    75%
  • HTML Level 1
    75%

Verifications

  • Facebook Connected
  • Preferred Freelancer
  • Payment Verified
  • Phone Verified
  • Identity Verified
  • Email Verified

My Top Skills

Browse Similar Freelancers