Since 2011, John Berry has been working in Praemittias Defense Solutions located 287, 287. John is a qualified Engineer with over seven years of work experience. According to John's CV and work profile, John has worked at more than three companies with numerous backgrounds and got different skills. John attended school at the Hawaii Pacific University from 2006 to 2008. John Berry can be found in Melbourne, Florida – where this professional currently lives. You can search for John's contacts. We can also provide you exhaustive contact information upon request.
Name variants:
Johnn Berry,
Jon Berry,
Jack Berry,
Jackie Berry,
Jacky Berry,
Johnny Berry
Last updated May 27, 2024
Contact Information
Workplace
Colleagues
Work History
Engineer
980 Mercantile Dr SUITE A, Hanover, MD 21076
Jan 2011 — May 2015
Co-Founder and Chief Technology Officer
I design and create Capture the Flag (CTF) hacking competitions. I also reverse engineer and exploit things.
from May 2015
Education
2006 — 2008
Occupations
Executive
Technology Director
Co-Founder
Engineer
Security
Technology Manager
Technical Managers
Founder
Chief Executive
Skills
Software Development
Vulnerability Research
Capture the Flag
Reverse Engineering
Computer Security
Cyber Security
Training
FAQs about John Berry
What is the main profession of John Berry?
The expert is a Co-Founder and Chief Technology Officer.
What jobs is John a professional at?
The expert is proficient at such jobs as Executive and Technology Director.
Where does John Berry currently live?
John lives in Melbourne, Florida.
Where did John Berry work?
John Berry worked at Praemittias Defense Solutions, Cromulence.
Where has John Berry studied?
John studied at the Hawaii Pacific University from 2006 to 2008.
What languages does John Berry speak?
John Berry speaks English.
Are there any professional industries John Berry is connected to?
John works in Computer & Network Security industry.
Are there any special skills John Berry has?
This person has such skills as Software Development, Vulnerability Research, Capture the Flag, Reverse Engineering, Computer Security, Cyber Security, and Training.