You will get Threat model for your company's application (web/mobile) using STRIDE.
Rising Talent

You will get Threat model for your company's application (web/mobile) using STRIDE.
Rising Talent

Project details
I do have vast professional experience across all IT cores. I have been working in the cyber security space for over 15 years. I am an expert in cryptography and threat modeling (shift-left approach or layered defense). With more than 20 years of industry experience, I will save you unnecessary headaches and money. I will make sure that you align with the best practice to maintain or satisfy your compliance needs. This will assist with privacy protection and information security. Making your organization invincible to internal and external threats. By the defense-in-depth mantra: The best defense is preparation against whatever may chance. The clarity I possess equips me with the rare knowledge of PASTA and leveraging attack trees or offensive approaches to model the possibility of threat in your applications. I will also offer you the mitigation controls and action to take.
Cybersecurity Expertise
Data Protection, Cyber Threat Intelligence, Cybersecurity AwarenessTechnology Type
Firewall, IaaS, Computer Network, Database, Operating System, SaaS, Web Application, Mobile Device, PaaSCybersecurity Regulation
GDPR, HIPAA, HITECH, NIST Cybersecurity Framework, PCI DSSWhat's included
Service Tiers |
Starter
$1,500
|
Standard
$4,000
|
Advanced
$6,000
|
---|---|---|---|
Delivery Time | 3 days | 14 days | 30 days |
Small Company Size | - | ||
Medium Company Size | |||
Large Company Size | - |
Frequently asked questions
About Josiah J.
Security Solution Architect
Columbia, United States - 3:31 am local time
Due to the high demand of Cybersecurity professionals and the shortage thereof, I will be dedicating a lot of time to non-profit organization in building cybersecurity ranges, Labs, and EdTech solutions covering security of emerging technologies for SMBs. While my resolve will remain true to the industry and solving your problems. I will like to let you know that I will be directly be involved with your cybersecurity needs. I will be strongly supporting no less, in all other projects hands-on within my experience and capacity.
Certified Blockchaing Professional (CBP) certified builder:
We do everything with security in view: Software engineering and development: Mobile app dev, web app and services dev, Cypto-systems, cyrpto_currency, IoT and Distributed Ledger technology expert.
1.Hashgraph 2. IOTA 3.Block Chain. I will consult to help choose the direction you want to take with these new technologies. I have a background in Engineering with 23 years experience in IT and 15 plus years experience in software and security development.
- with Engineer's Mind set
- with OS, firmware and software development SDLC
-Penetration testing, mitigation and remediation
- Prototyping expert on software development to hardware application
- Web 2.0/web3.0 knowledge including Backend and frontend experience with web and webservices
- API and LIbrary design, implementation and deployment
- Languages: C/C++, Objective C, java, javascript .net framework C#, Python, Ruby
DB
- Knowledge of data base repository configuration and structures
-sqlite3
-solair
-Mysql
Mobile devleopement tools
-Xcode,swift, eclipse, android studio
Other Tools
- Git lab
- Git hub
- Aws***
- Azure**
- FB Chat Bot integration***
DATA AND INFORMATION SECURITY EXPERT
I am interested in working on mobile applications, software and integrating all in a hardware e.g smartphone and micro controllers. I am currently working on Lokdon: This is a new crypto-system (encryption) application.
My focus is on everything security for software and hardware.
If you need secured application or software even a hardware system just let me know I will get it to you. I have great interest in embedded and IoT technology. I can offer you solutions in that area too.
Steps for completing your project
After purchasing the project, send requirements so Josiah J. can start the project.
Delivery time starts when Josiah J. receives requirements from you.
Josiah J. works on your project following the steps below.
Revisions may occur after the delivery date.
Step 1
Data flow diagram: We will create this by simulating your process workflow, interview and design documents. This will allow us to have real or practical logical dimension of your application.
Step 2
Attack Enumeration: We enumerate your application against extensible STRIDE threats. e.g Spoofing, tampering, repudiation, information disclosure, denial of service and escalation of privilege.