Edgar Gevorgyan
Web Developer, Software Engineer, and Hacker in Armenia, Yerevan
Edgar is a dedicated freelance developer with strong skills in HTML, CSS, JavaScript, and PHP, but his true passion lies in cybersecurity. He focuses on securing digital systems and preventing cyber threats. His expertise includes information security, network security, malware analysis, and data encryption. Edgar is committed to protecting data from breaches and unauthorized access, always learning about new threats and security practices.
He is proficient in penetration testing (pen testing), using various tools to simulate attacks and identify vulnerabilities in systems. Edgar is skilled in defending against common threats like SQL injection, Cross-Site Scripting (XSS), Command Injection, and Cross-Site Request Forgery (CSRF). His deep knowledge of secure coding practices helps ensure that applications are built to prevent these vulnerabilities.
Edgar also specializes in the OWASP Top 10, a key framework for web application security. He applies it to protect against injection attacks, man-in-the-middle (MITM) attacks, and uses SSL/TLS encryption to safeguard sensitive data. He understands the importance of confidentiality, integrity, and availability in data protection (the CIA Triad).
In addition to application security, Edgar is skilled in network security. He knows how to set up and manage firewalls, VPNs, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS). He is also experienced in mitigating Distributed Denial of Service (DDoS) attacks and ensuring that networks remain secure under heavy traffic.
Edgar is particularly focused on cloud security and the protection of devices in the Internet of Things (IoT). As more devices become interconnected, Edgar ensures they are protected from emerging threats. He also has an interest in ethical hacking and is proficient at recognizing and defending against social engineering tactics, including phishing and spear phishing attacks.
Edgar is always looking for new ways to improve his cybersecurity skills, constantly adapting to the evolving landscape of threats. His goal is to build secure, resilient systems and contribute to the ongoing improvement of cybersecurity practices.