Author Image

Hi, I am natryvat

Angel Navarro

DevSecOps Engineer at Verato

I am a cybersecurity passionate with about 3 years of working experience. I have worked as a developer: creating new software features and maintaining code; as security engineer where I have helped to detect and mitigate security incidents; and as a DevOps engineer managing and amtomatic infrastructure. Linux is my main operating system as well as I am capable to work from command line interface. Learn new things about cybersecurity is a hobby for me.

Self Learning
Team Work
Hard Working

Skills

Experience

1
Verato

May 2023 - Present, Merida, Mexico

Knowing who is who starts with healthcare data integrity. Verato Universal Identity platform introduces the industry’s first hMDM, the next generation MDM for healthcare, enabling a single source of truth for patient, provider, member and consumer identity.

DevOps Engineer

Oct 2023 - Present

  • Responsible for creating and managing our computing infrastructure supporting our SaaS offering and our internal Business Operations. Work closely with the Operations team to ensure that all systems are available and performing at the expected SLAs, 24x7. Also work closely with the Development team in small Agile teams to develop and maintain our build, test, and deployment automation.
  • Implement and stay abreast of industry best practices regarding Cloud Computing, Security, Configuration Management, Back-up, Failover, Monitoring, Alerting, Disaster Recovery and Business Continuity processes. Given the size and elaborate nature of our environment, all creation and administration of our computing resources needs to be automated.
  • Cultivate a philosophy of continuous improvement. Strike a careful balance of advocating for adoption of new technologies and processes to optimize our operation, while emphasizing security and compliance.
DevSecOps Engineer Associate

May 2023 - Oct 2023

  • Responsible for creating and managing our computing infrastructure supporting our SaaS offering and our internal Business Operations. Work closely with the Operations team to ensure that all systems are available and performing at the expected SLAs, 24x7.
  • Implement and stay abreast of industry best practices regarding Cloud Computing, Security, Configuration Management, Back-up, Failover, Monitoring, Alerting, Disaster Recovery and Business Continuity processes.
  • Cultivate a philosophy of continuous improvement. Strike a careful balance of advocating for adoption of new technologies and processes to optimize our operation, while emphasizing security and compliance.

Information Security Analyst
Amdocs

November 2021 - May 2023, Guadalajara, Mexico (Remote)

Amdocs is a multinational corporation which specializes in software and services for communications, media and financial services providers and digital enterprises.

Responsibilities:
  • Analyze and evaluate security events, and consulting logs in security systems such as anti-virus, firewalls, patch management, intrusion detection, and encryption technologies.
  • Recommend fixes, security patches, and any other measures required in the event of a security breach as part of Remediation and Eradication solutions.
  • Detect, Mitigate and Eradicate Email vector attacks such as SPAM, Phishing and Whale phishing attacks.
  • Monitoring, detect, address, and solve incidents using ESM and SOAR event console.
2

3
Unidad de Sistemas e Informática

August 2020 - September 2021, San Luis Potosi, Mexico

Creating and maintaining solutions for new Digital Government project.

Security Engineer & System Administrator

January 2021 - September 2021

  • Make known the connectivity and security model to other local government agencies.
  • Security monitoring on-premise and cloud environments (AWS).
  • Vulnerability assessment.
  • Risk management (risk matrix, recovery and continuity plans).
  • System configuration for threat alerts and monitoring.
  • Incident response.
  • ELK administration.
  • Linux systems configuration.
  • Linux troubleshooting.
  • Troubleshooting application deployment on infrastructure.
  • Firewall and WAF (AWS) rules management.
  • Troubleshooting Gitlab CI pipeline.
  • Planning DevSecOps automatization with Docker containers.
Intern Security Engineer

August 2020 - December 2020

  • Document Digital Forensics tools to be used internally in case of any incident.
  • Identify and document local laws and procedures related to Personally Identifiable Information (PII).
  • Identify common malicious activities in the internal network and propose contermeasures needed.
  • Document flow of investigation in case of security incident and the government agencies involved in each step.

Software Engineer
SutilMind

Juny 2020 - September 2021, San Luis Potosi, Mexico

Taylor-made tech solutions for your business’s requirements.

Responsibilities:
  • Software development.
  • Maintenance and development of new features to a web platform.
  • Automation with python.
  • Configure and manage CMS.
4

Education

Information Technology Engineering
GPA: 9.2 out of 10
Taken Courses
  • Programming
  • Web Programming
  • Security
  • Computer Networks
  • Operating Systems
  • Programming Languages
  • Data Bases
  • Data Structures and Algorithm
  • Software enginnering
  • Artificial Intelligent
  • Data Mining
Extracurricular Activities
  • Cyber security learning club, participating in two national 'Capture The Flag' competitions.
  • Robotics Club, participating in two national tournaments.
  • CCNA Switch and Routing.
2021-2022
Information Security
Taken Courses
  • Information Security Fundamentals
  • Internet Networks
  • Pentesting and Hacking methodology
  • Intelligence for Security
  • Linux Servers Administration
  • Linux Command Line Interface
  • Digital Forensics methodology

Projects

Python
Python
Owner

Basic Instagram copy built in Django. This was done a part of a course. Project was implemented in docker compose with dev and prod environments. Demo was uploaded to production environment on AWS and nginx server.

Toha
Toha
Developer

A Toga-based Hugo personal portfolio. Many improvements/customizations were made: dark mode, certifications/badges section, courses section with PDF reader, achievements slider and posts section loading content from my personal blog.

Wordpress
Wordpress
Owner Apr 2022 - Present

A Wordpress blog. There I post Writeups about cybersecurity boxes/rooms/vulnerable machines, hacking and other related topics.

Certifications

eLearnSecurity Junior Penetration Tester
AWS Certified Solutions Architect - Associate
HashiCorp Certified: Terraform Associate
CompTIA A+
Azure Fundamentals
Java Foundations Certified Junior Associate
Unity Certified User: Programmer
PCEP - Certified Entry-Level Python Programmer
Introduction to Cybersecurity
Cybersecurity Essentials
Python Essentials 1
Software Development Fundamentals
Networking Fundamentals
Database Administration Fundamentals
HTML5 Application Development Fundamentals
Security Fundamentals
Microsoft Office Excel 2013
Microsoft Office Word 2013
Microsoft Office PowerPoint 2013

Courses

Card image course

15 modules with the most relevant subjects in cybersecurity: principles of cryptography and steganography, Security and infrastructures, programming, forensic analysis, OSINT, BlueTeam, RedTeam…

Card image course

Learn basic IT security concepts and best practices. Identify security threats and learn how to defend against them. Prepare for and pass the CompTIA Security+ (SY0-601) exam.

Card image course

Prepare for the LPIC DevOps Tools Engineer Certification exam by learning about the philosophy of DevOps and commonly-used DevOps tools.

Card image course

This course goes into the details of how Docker works in detail and how it can help you get the most out of the tool in professional development: Know Docker philosophy and apply Docker best practices.

Card image course

Build simple LANs, perform basic configurations for routers and switches, and implement IPv4 and IPv6 addressing schemes. Configure and troubleshoot connectivity a small network using security best practices.

Card image course

Develop overarching fundamentals for all programming languages. Practice your skills through hands-on labs and write your own programs.

Shows you how to install, configure, and use Autopsy to conduct a digital forensics investigation. Learn about hash sets, keyword searching, Android, timelines, and more. Includes hands-on labs.

Card image course

Learn about the DevSecOps process and how to secure environments. This course also includes best practices.

Docker course from basic to advanced.

Card image course

Know the most used Linux distributions in servers. Manage packages according to distribution. Configure tools to monitor processes and services. Install web services and configure them for production environments.

Card image course

Understand the DevOps philosophy. Master the levels and benefits of testing. Fit the CI into the development flow. Access CD benefits through Docker.

Card image course

This course will provide you with the knowledge and hands-on experience that you will need in order to be a successful Kubernetes administrator in the real world and pass the CKA exam.

Introduction to Cybersecurity. Threats and Risks. Focus and Organization. Security measures. ISO/IEC 27032 and other related standards. Legislation and Regulations.

Card image course

This course will help you understand what cloud security services and solutions should be available and how to apply them. This course cover the fundamentals of cloud computing and governance, risk, compliance, business continuity planning, and disaster recovery.

Achievements

Recent Posts