Friday, 19 May 2023

Curriculum Vitae



Andrzej Wysocki

Java WebApp Developer & Cyber Security Specialist (Pentester).

Birth date: 13 Sep 1977 - Programmer's Day ;).
Email: andrzej.wysocki@nidansoftware.com.
Location: Warsaw, Poland.

GitHub: https://github.com/nm108.
DeviantArt: https://www.deviantart.com/neo-mahakala-108.
LinkedIn: https://www.linkedin.com/in/neomahakala108/.
CV (a draft, should be ready in September 2025): Click to Download.



About me:

I am looking for work in IT (Java WebApps and/or Penetration Testing).

In Dec 2024 I've enrolled to a Pentesting Course (https://cyberium.pl), and should complete it in Sep 2025.
I'll add the images of the certificates to this web page once I'll complete the course and pass the final exam.

I have about 5 years of professional experience in coding Internet Applications using Java & related technologies, but my fascination with computers & programming started when I was a kid.

I’ve had a long break from programming because of health reasons. I hope to find an employer who will give me a try, who will give me a chance to prove myself that I am a very skilled, talented and professional programmer despite my health issues. I want to return to professional programming and/or penetration testing, and stay there for a long time - preferably until end of my life.

I know how to write high quality code & documentation, I know some idioms (good programming practices), I try to apply general theories of Computer Sciences when I program computer devices.

I am independent team player when it comes to professional programming.


Work experience:

1. Java Programmer at XPro sp.z.o.o. (07.2009 - 02.2010).

Java / GWT (Google Web Toolkit) - bugfixing and implementation of law documents browser for Wolters Kluwer company, located in USA.

Wolters Kluwer delivers professional information, software and services for legal industry, public administration, business, healthcare and compliance area.


2. Java Programmer / Consultant / Analyst at Connectis (04.2008 - 03.2009).

Connectis was outsourcing company, i was delegated to another company where i've maintained MS SQL Database.
I've also coded backend of internet service for business inquiries, in Java Technologies.


3. Java Programmer / Analyst at XPro sp.z.o.o. (09.2005 - 03.2008).

I've implemented law documents browser for Wolters Kluwer company, located in USA.

I've worked with business logic, frontend and user input parser using Java Technologies: Java, GWT, JUnit, JavaCC and other.


Technologies & Tools known:

Web Applications in Java:

- Java,
- Object Oriented Programming & Design,
- Concurrent Programming,
- Algorithms & Data Structures,
- Internet & Computer Networks,
- Languages & Automatons
  (including regular expressions and parsers),
- Spring Framework,
- GWT (Google Web Toolkit),
- Javascript, CSS & HTML,
- SQL, PL/SQL,
- UML (Mostly Class Diagrams),
- Eclipse IDE, Android Studio,
- Mvn, Ant,
- JUnit, Easymock,
- JIRA, Mantis,
- Git, SVN,
- Windows, Linux, MacOS,
- JavaCC,
- Design by Contract,
- SOLID,
- Writing high quality code and high quality
  documentation, according to JavaDoc
  standard, with preconditions, postconditions and
  invariants, with contracts documented as well,
- Other technologies & tools from Java ecosystem.
Cybersecurity (Red Team/Pentesting):

- Kali Linux
- Internet & Computer Networks
- Risk Assesment & Management in Cybersecurity
- Cybersecurity Theory & Purple Teaming
- PTES: Penetration Testing Execution Standard
- OSINT: Open Source Intelligence
- File Metadata Extraction (exif tool)
- Getting Domain & DNS info, Scanning for Subdomains
  (whois, dig, dnsenum, subfinder, ffuf)
- Webapp Fingerprinting
  (curl, wappalyzer, builtwith.com, whatweb, wafw00f,
  netcraft, nikto, wpscan)
- Crawling & Scraping
  (katana, gospider, eyewitness, burpsuite, scrapy, jsoup)
- Network Scans (hosts, ports, services & versions, OS)
  (nmap, arp-scan, netdiscover, netcat, ping sweep)
- Vulnerability Analysis (nessus, openvas/gvm)
- Exploitation & Reverse Shells (manual, metasploit)
- Attacks on Web Applications: IDOR, Attacks on Login
  Forms, Sql Injection, XSS, Command Injection,
  LFI: Local File Inclusion, RFI: Remote File Inclusion
  (burp suite, hydra, sqlmap, webhook.site)
- Post-Exploitation Techniques, including File/Data
  Transfer & Privilege Escalation
- Pentest Documentation & Reporting

- Java,
- Low Level Programming,

- More will be added as I go through cybersecurity
  course (https://www.cyberium.pl)



Education:

Warsaw University (2005 - 2006).
ZSI: 3-year Bachelor Level Informatics Professional Studies (unfinished because of health reasons).


Courses & Certificates.

I've started a Penetration Testing Course, and will look for work in Cybersecurity (Pentesting) once I'll complete these lessons, and pass the final exam (course started at 12 December 2024, and should be completed in September 2025).

Link to the Course (in polish language): [ https://cyberium.pl ].


Languages known:

- Polish (native),
- English.


Personal interrests & hobbies:

- Buddhism,
- Computer Programming, Computer Sciences & Cybersecurity (Pentesting),
- Martial Arts (mostly Karate Kyokushinkai),
- Visual, Digital Arts.





-=- Buffer Overlov. -=-
(click image to enlarge)

-=- 'buffer overlov', or more precisely heap overflow attack, for buffers are on heap (in heap segment). -=-



I hereby consent to the processing of my personal data for the purpose of the recruitment process.