Adding a Hiring Option #23

Open
DarkFeather wants to merge 3 commits from hire into main
Showing only changes of commit 56981e1352 - Show all commits

View File

@ -8,7 +8,7 @@ I am available to represent AniNIX as a consultant. Sometimes various SMB's (sma
[Your average penetration test](https://www.getastra.com/blog/security-audit/penetration-testing-cost/#:~:text=Testing%20Cost%20%E2%80%93%20FAQs-,How%20much%20does%20a%20Pentest%20cost%3F,on%20a%20number%20of%20devices.) will cost around $2,500 to $50,000. That's a hefty sum for an organization with a tech staff of 0-5 full-time employees. Especially for a smaller lab, coffee shop, or store, online presence is important for being able to reach customers, but that presence needs to be secured in order to protect the brand. [Your average penetration test](https://www.getastra.com/blog/security-audit/penetration-testing-cost/#:~:text=Testing%20Cost%20%E2%80%93%20FAQs-,How%20much%20does%20a%20Pentest%20cost%3F,on%20a%20number%20of%20devices.) will cost around $2,500 to $50,000. That's a hefty sum for an organization with a tech staff of 0-5 full-time employees. Especially for a smaller lab, coffee shop, or store, online presence is important for being able to reach customers, but that presence needs to be secured in order to protect the brand.
[AniNIX believes strongly](https://aninix.net/AniNIX/Wiki/src/branch/main/Policies/User_Ethics.md#our-mission-statement) that everyone deserves to be secure online, even if they can't afford to pay for the larger cybersec firm s to do their audits. I will audit your ecosystem for: [AniNIX believes strongly](https://aninix.net/AniNIX/Wiki/src/branch/main/Policies/User_Ethics.md#our-mission-statement) that everyone deserves to be secure online, even if they can't afford to pay for the larger cybersec firms to do their audits. I will audit your ecosystem for:
* [OWASP Top 10 vulnerabilities](https://owasp.org/www-project-top-ten/) * [OWASP Top 10 vulnerabilities](https://owasp.org/www-project-top-ten/)
* System fingerprints that could lead attackers to exploiting the [CISA Known Exploited Vulnerabilities list](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) * System fingerprints that could lead attackers to exploiting the [CISA Known Exploited Vulnerabilities list](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
@ -23,7 +23,7 @@ We have more details available in [this whitepaper](https://aninix.net/assets/re
I've been a DevSecOps engineer for more than a decade -- if you are looking for help with your IT operations, I'm happy to look at your operations and offer recommendations on potential improvements. From operational mean-time-to-recover to Infrastructure-as-Code and self-hosting vs. cloud offerings, my goal is to help you find the best tool for the job. Development gives a market edge, and security protects the business from liability. However, unless you are in either business, it's operations that makes tools useful -- the availability of your tools is what makes the business money & builds reputation with your clientele. I've been a DevSecOps engineer for more than a decade -- if you are looking for help with your IT operations, I'm happy to look at your operations and offer recommendations on potential improvements. From operational mean-time-to-recover to Infrastructure-as-Code and self-hosting vs. cloud offerings, my goal is to help you find the best tool for the job. Development gives a market edge, and security protects the business from liability. However, unless you are in either business, it's operations that makes tools useful -- the availability of your tools is what makes the business money & builds reputation with your clientele.
My typical rate is $55/hour. I can be contracted for small work related to small/medium business operations, or I can consider full-time employment for an offer in the right pay range. My typical rate is $60/hour. I can be contracted for small work related to small/medium business operations, or I can consider full-time employment for an offer in the right pay range.
## References ## References