Profile image of digitaloffensive
Member since October 6, 2009
0 Recommendations


Online Offline
My team at Digital Offensive have over 15 + years in the information security field. We specialize in VoIP, Pen Testing, Web Security, Computer and Network Security and much more. My staff as well as myself hold the industries top certifications in the security field as well as have published books on the subject. Besides my full time job and freelancing I am also a SANS mentor for the GCIH certification. No job is to big or small. Feel free to contact me with questions.
$65 USD/hr
7 reviews
  • 90%Jobs Completed
  • 100%On Budget
  • 100%On Time
  • N/ARepeat Hire Rate

Portfolio Items

Recent Reviews

  • image of The U. Website Analysis & Website Vulnerabilities Tester [Sealed]

    “I'm not sure what to say... It's what I wanted but better than I expected... Digitaloffensive is a PRO! Excellent work! I will hire him again for future projects.”

  • image of Jarvis K. Computer Security/IT Consultant for Trust Seal Business $1500.00 USD

    “Mike was absolutely great to work with. He has been with us every step of the way and explained everything very carefully until we understood what we were getting. He gave us constant attention and quick responses to questions when needed. He also tries to help you save money and is very practical. Definitely recommended!”

  • image of Jesper J. Certified US Based Pentester (Whitehat) $500.00 USD

    “Young US Based test of Pen-testers, delivered as agreed on time, and as expected.”

  • image of tonyvillast virus removal from web site $150.00 USD

    “Very professional. Delivered exactly what he promised. Great communicator . Highly recommended I could not ask for a better service, will use again without a doubt.”

  • image of Kevin N. security risk of VPN, Citrix, OWA time out $80.00 USD

    “Very professional. Delivered exactly what he promised. Great communicator and asked the right questions to deliver world class result. Highly recommended.”

  • image of greedysteve Phone Numbers Forwarded to Central Sales Office [Sealed]

    “Very reliable and diligent provider. Understood what was needed and went above and beyond to provide great solutions.”


Enterprise Security Administrator

Feb 2007

Provide enterprise security guidance and leadership to assure the protection of ePHI and Lancaster Generals electronic assets. oPreformed a risk assessment to determine current strengths, weaknesses and to define Lancaster General's acceptable risk. oAnalyzed firewall logs for anomalies to help pinpoint rouge machines, access points, spy ware and other malicious desktop behavior to ensure the integrity of our internal network. oResearch evolving threats and new security regulations to help La

Senior Security Engineer

Mar 2006 - Apr 2007 (1 year)

Provide third level technical support for SunGard's Managed Firewall and IDS security service offerings such as Checkpoint, Netscreen, Cisco Pix firewalls, and ISS. Responsible for identifying customer issues, troubleshooting, determining root causes, design and coordinating resolutions using a variety of applications and tools. oPlanned, implemented, and managed SunGard's firewall management infrastructure for Checkpoint Provider1, Netscreen Security Manager, and Cisco Security Manager allow



1997 - 2001 (4 years)


Certified Information Systems Security Professional (2008)

nternational Information Systems Security Certification Consortium, Inc., (ISC)²

The CISSP was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Organization for Standardization) Standard 17024:2003. CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement. For your CISSP credential, your professional experience has to be in two or more of these 10 (ISC)² CISSP domains:SC Magazine * Access Control * Application Development Security * Business Continuity and Disaster Recovery Planning * Cryptography * Information Security Governance and Risk Management * Legal, Regulations, Investigations and Compliance * Operations Security * Physical (Environmental) Security * Security Architecture and Design * Telecommunications and Network Security

GIAC Certified Incident Handler (GCIH) : Hacker Techniques, Exploits & Incident Handling (2007)



Information Security and VoIP Articles

[login to view URL]


  • Facebook Connected
  • Preferred Freelancer
  • Payment Verified
  • Phone Verified
  • Identity Verified
  • Email Verified

My Top Skills

Browse Similar Freelancers