I was enlightened with the message of offering this opportunity, which has an enviable reputation for carrying out excellent work. As a person who is very much interested in Information Systems Security, IT Security Audit & Assurance fields, I had no hesitations to bid for the project, knowing the immense importance that will attach to my career.
Work Experiences:
• May 2013 – To date – Senior Systems Assurance Analyst at TIM Asia Pacific (TETRAN Pty Limited)
• August 2012 – May 2013 – Information Systems Auditor/Analyst at KPMG Sri Lanka
• July 2011- July 2012 - Mobile Application (Game) Developer/Analyst at GameCell, Manchester, UK
Exploit kits (EK)s are a type of malicious toolkit used to exploit security holes found in software applications (Adobe Reader, etc) for the purpose of spreading malware. These kits come with pre-written exploit code and target users running insecure or outdated software applications on their computers. While the process of becoming exploited by one of these kits will vary, the procedure usually goes a bit like this:
1. A victim visits a website whose server has been hacked by cybercriminals.
2. The victim is redirected through various intermediary servers
3. The victim lands at a rogue server hosting the exploit kit
4. The exploit kit gathers information on the victim and determines the exploit to deliver
5. Exploit is delivered
6. If exploit succeeds, a malicious payload (custom malware program) is downloaded to the victim’s computer