EnviarNet

Managed Secuirty Service Provider | SOC Services | Information System Auditor | Information Security Consulting

01101001 01101110 01100110 01101111 01110011 01100101 01100011

About Us

Through our Partners, we provide your company with top protection of all your information and communication assets

sales@enviarnet.com
+240 222 333 676
Malabo, Equatorial Guinea

Our Specialization

Security Solution

Endpoint Security
Cloud Security
Ethical Hacking
Cryptography
Network Security

Cybersecurity Management

Managed SOC
Managed Detection & Response (MDR)
Vulnerability & Risk Assessment
Cybersecurity Governance
Security Audit and Compliance
Phising Simulation

Support & Deployment

Business Continuity & Disaster Recovery
Technology Integration
Discovery & Gap Analysis
Cyber Awerness Training
Technical Support

Core Services

Endpoint Detection & Response (EDR)

Through our partners platforms, we offer you seamless Endpoint Detection & Response by instantly isolating threats, maintaining visibility and automatic response to ensure your operations are protected in real time

Automatic protection Smart Detection Instant Containment Smarter Response

Email Protection

Email still remains the most common and successful tactic bad actors use to infect an organization with malware. Employees cannot be trusted to do the right thing with suspicious emails resulting in a heightened risk of data breaches, ransomware, and other threats.

Real-time Blacklisting Recipioent Verification Sender Policy Framework Anti Spoofing

Managed Security Operation Center (SOC)

With our enterprise-grade threat detection, incident response, and continuous monitoring. We provide a proactive protection, backed by real-time security intelligence and automated response capabilities—all managed through a single, scalable platform designed to meet the evolving cybersecurity demands of businesses of any scale.

(SIEM) Threat Detection & Response (TDR) Intrution Detection (IDS) Incidence & Response Management

Governance, Risk and Compliance (GRC)

With our gap analysis experience, we provide vital insights to ensure your organization adheres to IT and data security standards like ISO 27001, NIST and also compliance with data protection regulations like GDPR, PCI DSS. We develop orgnizational cybersecurity governance and standard procedures that ensures a secure operational environment.

ISO 27001, NIST, PCI DSS, GDPR Compliance Risk Management

Cybersecurity Awareness Training

In a well secured environment, employees and people has shown the weakest point for most successful attacks and your people need to know how best to interact with technology to reduce threat vectors. Cybersecurity awareness has remained instrumental to protecting your enterprise and assets from bad actors. Our robust cybersecurity awareness training geard at ensuring the right information is passed down the line.

Security Awareness For Everyone SAFE Threat Sharing Case Studies Identity Theft Awareness

Business Continuity & Disaster Recovery

We will assess your organization's readiness for disaster recovery and business continuity. We develop, test and maintain business continuity and recovery plans to ensure swift restoration of your services in an event of a disaster

Business Impact Analysis Recovery Strategies Testing and Maintenance

Information System Auditing

Do you wish to model your information system according to known standards? We offer cybersecurity auditing and compliance to enable identify possible vulnerabilities in your network

Compliance Cybersecurity Auditing Risk Management

AI adoption and IT Consulting Services

You IT partner for new technology implementation like AI agents, business automations and integrations, our highly skiled and experienced team will work with you to understand your needs and provide you with insightful guideline on tools to adopt and to operate. We will provide your team with product knowledge and training

Agentic AI Adoption Business Automation Network Integration

Experience

Security Analyst

Conversia

Jan 2025 – Mar 2025
  • Conducted vulnerability assessment and penetration testing using tools like Nessus and Acunetix
  • Performed manual testing to identify security vulnerabilities in web applications
  • Managed AWS IAM configurations and enhanced cloud security posture
  • Documented findings and provided remediation recommendations to clients

Education

BTech in Computer Science Engineering

Amity University Uttar Pradesh

2022 – 2026

CGPA: 8.36

Class XII

Somerville School

2022

Percentage: 89.8%

Class X

Somerville School

2020

Percentage: 94.8%

Certifications

Certified Ethical Hacker (CEH)

EC-Council

CompTIA Security+

CompTIA

Professional Certificate Program in Cybersecurity - Red Team

IIT Kanpur (Capstone Projects)

Systems and Usable Security (Elite Silver)

NPTEL

Web Application Scanning Certification

Qualys

Networking Basics & Introduction to Packet Tracer

Cisco NetAcad

AWS Certified Cloud Practitioner

Amazon Web Services

API Fundamentals Student Expert

Postman

Achievements

Scopus-indexed Book Chapter

"Robotics and Cybersecurity Fundamentals: Understanding Robotics, Penetration Testing Tools and Attack Vectors" accepted for publication in Book "Robot Automation: Principle, Design and Applications" (CRC Press, Taylor & Francis, Scopus Indexed) on 11/02/2025

Book Chapter Submission

"Hacking Generative Artificial Intelligence: Data Privacy via Image Poisoning" submitted for publication in book "Blockchain solutions for securing IOT networks: Practical applications and case studies"

Publications in InfoSec WriteUps and System Weakness

Published multiple cybersecurity and scripting-related articles on Medium, featured in renowned publications like InfoSec Write-Ups and System Weakness

Top 10 at Hacknovate 5.0

Secured Top 10 (Offline Category) in Hacknovate 5.0, May 2024, with Team API Alchemist at ABES IT, Ghaziabad

Global Top 2% on TryHackMe

Ranked in the Global Top 2% on TryHackMe, showcasing expertise in cybersecurity, ethical hacking, and VAPT through solving advanced, real-world challenges

Trainings & Courses

Forage Cybersecurity Job Simulator

  • MasterCard
  • Telestra
  • Datacom
  • ANZ
  • AIG
  • TCS
  • PWC
  • Commonwealth Bank

AWS Educate - Getting Started with Security

  • Specialized training in AWS IAM and security services

TryHackMe Security Paths

  • Jr Penetration Tester
  • Web Fundamentals

Microsoft Learn Security

  • SC-200: Configure Microsoft Sentinel environment
  • Linux command line and Shell
  • Introduction to GitHub

SimpliLearn Training

  • ISACA CISM
  • ISC2 CCSP
  • CompTIA Network+
  • Introduction to Cyber Security
  • Linux Training

Cisco NetAcad

  • CCNA v7: Introduction to Networks Training

Udemy Security Courses

  • Complete Ethical Hacking Bootcamp
  • Complete Ethical Hacking Course With ParrotOS 2022

EC-Council CodeRed

  • Top 100 Interesting Bugs
  • Getting Started with IoT Security
  • Introduction to Web Forensics
  • Cybersecurity: Cloud Security

Article

Pixel Poisoning: Hacking Generative AI

Pixel Poisoning: Hacking Generative AI

A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.

Read on Medium
Pixel Poisoning: Hacking Generative AI

SQL Injection Exploitation Made Easy: A Practical Guide to SQLMAP

Learn how to exploit SQL injection vulnerabilities using SQLMAP, an automated penetration testing tool for database security assessment.

Read on Medium
Pixel Poisoning: Hacking Generative AI

The Art of Wi-Fi Hacking & Protection with Aircrack-ng

A comprehensive guide to hacking and securing Wi-Fi networks using Aircrack-ng, covering practical attack techniques, encryption vulnerabilities, and prevention strategies.

Read on Medium
View All Posts on Medium

Get In Touch

Email

sales@enviarnet.com

Phone

+240 222 333 676

LinkedIn

Connect with me