{"id":11,"date":"2010-12-27T15:20:26","date_gmt":"2010-12-27T21:20:26","guid":{"rendered":"http:\/\/www.victormiranda.com.mx\/vmwp\/?page_id=11"},"modified":"2020-06-19T12:06:02","modified_gmt":"2020-06-19T18:06:02","slug":"mis-servicios","status":"publish","type":"page","link":"https:\/\/www.victormiranda.com.mx\/vmwp\/mis-servicios\/","title":{"rendered":"Experiencia"},"content":{"rendered":"<p>M\u00e1s de 28 a\u00f1os de experiencia profesional trabajando en el \u00e1rea de Seguridad Inform\u00e1tica en el sector Financiero, Gobierno y Grandes Corporativos.<\/p>\n<p>7 a\u00f1os como CISO en BANCO, teniendo como actividades principales:<\/p>\n<ul>\n<li>\u00a0Atenci\u00f3n de Incidentes<\/li>\n<li>\u00a0Auditoria de TI<\/li>\n<li>An\u00e1lisis Forense<\/li>\n<li>Recuperaci\u00f3n de Informaci\u00f3n<\/li>\n<li>Ethical Hacking y Pentest<\/li>\n<li>An\u00e1lisis de Vulnerabilidades<\/li>\n<li>Ingenier\u00eda Social<\/li>\n<\/ul>\n<p>As\u00ed como tambi\u00e9n: An\u00e1lisis de Vulnerabilidades, Pruebas de Penetraci\u00f3n (Ethical Hacking), Especialista en C\u00f3mputo y An\u00e1lisis Forense, An\u00e1lisis de Riesgos, Lead Auditor en ISO 27001, Ingenier\u00eda Social, Recuperaci\u00f3n de Informaci\u00f3n en Dispositivos de Almacenamiento, DLP y Cifrado de Informaci\u00f3n, Arquitecturas de Seguridad y Auditoria de Sistemas.<\/p>\n<p><em><strong>Certificaciones<\/strong><\/em><\/p>\n<ul>\n<li>EC-Council Certified Security Analyst \u2013 (ECSA)<\/li>\n<li>Certified Network Defender \u2013 (CDN)<\/li>\n<li>ISO\/IEC 27001:2013 \u2013 Lead Auditor<\/li>\n<li>ITIL v3 Fundations<\/li>\n<li>Acunetix Certificate &#8211; (AUT)<\/li>\n<li>Metasploit Pro Certified Specialist \u2013 (MPCS)<\/li>\n<li>Certified Saint Security Professional &#8211; (CSSP)<\/li>\n<li>Certified Ethical Hacker Course &#8211; (CEH)<\/li>\n<li>Core Impact Certified Professional &#8211; (CICP)<\/li>\n<li>Lead Auditor ISO\/IEC 27001:2005<\/li>\n<li>Cisco Certified Network Associate &#8211; (CCNA)<\/li>\n<\/ul>\n<p><em><strong>Cursos<\/strong><\/em><\/p>\n<ul>\n<li>Programaci\u00f3n en Python<\/li>\n<li>EC-Council Certified Security Analyst \u2013 (ECSA)<\/li>\n<li>ISO\/IEC 27001:2013 \u2013 Lead Auditor<\/li>\n<li>Certified Network Defender \u2013 (CDN)<\/li>\n<li>ITIL v3 Fundations<\/li>\n<li>SANS: \u201cSEC 518 Mac Forensic Analysis\u201d<\/li>\n<li>SANS: \u201cSEC 508 Advanced Digital Forensics and Incident Response\u201d(GCFA)<\/li>\n<li>SANS NetWars: Tournament of Champions &amp; Intense Tournament OnSite<\/li>\n<li>Rapid7 Nexpose &amp; Metasploit 101 &amp; 201<\/li>\n<li>Certified Saint Security Professional (CSSP)<\/li>\n<li>Tenable Certified Nessus User (TCNU)<\/li>\n<li>Tenable Certified Nessus Auditor (TCNA)<\/li>\n<li>Certified Ethical Hacker Course (CEH)<\/li>\n<li>SANS: \u201cSEC 408 Computer Forensic Investigations\u2013Windows In-Depth\u201d(GCFE)<\/li>\n<li>SANS \u201cSEC 401 Security Essentials\u201d (GSEC)<\/li>\n<li>SANS \u201cSEC 504: Hacker Tools, Techniques, Exploits &amp; Incident Handling\u201d (GCIH)<\/li>\n<li>Diplomado de Seguridad Inform\u00e1tica: ITESM<\/li>\n<li>Defcon: Conferences<\/li>\n<li>Blackhat: Conferences<\/li>\n<li>RSA: Conferences<\/li>\n<\/ul>\n<p><em><strong>Ponencias\/Entrevistas<\/strong><\/em><\/p>\n<p>\u2022 Barra Mexicana, Colegio De Abogados, A.C.<br \/>\n\u2022 1a Semana de la Seguridad &#8211; UAT<br \/>\n\u2022 Foro de Derecho y seguridad digital &#8211; Universidad An\u00e1huac<br \/>\n\u2022 Entrevista Hackers y Seguridad Infoem\u00e1tica &#8211; Juzgue Usted adn40<br \/>\n\u2022 Entrevista C\u00f3mputo Forense &#8211; Vida Digital Canal Once<br \/>\n\u2022 2a Semana de la Ciberseguridad &#8211; UAT<\/p>\n","protected":false},"excerpt":{"rendered":"<p>M\u00e1s de 28 a\u00f1os de experiencia profesional trabajando en el \u00e1rea de Seguridad Inform\u00e1tica en el sector Financiero, Gobierno y Grandes Corporativos. 7 a\u00f1os como CISO en BANCO, teniendo como actividades principales: \u00a0Atenci\u00f3n de Incidentes \u00a0Auditoria de TI An\u00e1lisis Forense Recuperaci\u00f3n de Informaci\u00f3n Ethical Hacking y Pentest An\u00e1lisis de Vulnerabilidades Ingenier\u00eda Social As\u00ed como tambi\u00e9n: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"class_list":["post-11","page","type-page","status-publish","hentry","box-left","clearfix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.victormiranda.com.mx\/vmwp\/wp-json\/wp\/v2\/pages\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.victormiranda.com.mx\/vmwp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.victormiranda.com.mx\/vmwp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.victormiranda.com.mx\/vmwp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.victormiranda.com.mx\/vmwp\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":35,"href":"https:\/\/www.victormiranda.com.mx\/vmwp\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"predecessor-version":[{"id":23109,"href":"https:\/\/www.victormiranda.com.mx\/vmwp\/wp-json\/wp\/v2\/pages\/11\/revisions\/23109"}],"wp:attachment":[{"href":"https:\/\/www.victormiranda.com.mx\/vmwp\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}