Djinni
  • Candidates
  • Jobs
  • Salaries
  • Log In
  • Sign Up
Error

Candidates 705

SOC analyst/Security Enginner

$3000 / mo
≈ $36000 / year net
Security · 4 years of experience · B2 - Upper Intermediate · Published today
Ukraine, Lviv · Only remote
Expirience:
- MSSP project
- Healtcheck
- Create documentaion
- provide workshop session
- Typical SOC Stuff
Currently work in an international Company
- Building SOC
- Create documentation
- Configure SIEM and VM
- part of IR team
- Prepare company for Audit
- Audit Log source to reduce license usage
- Maintain SIEM solution
- Working with EDR
Looking for
Looking for an opportunity to grow
Read more
Skills
Cybersecurity SOC Information Security Analytical skills Security IT Security
See public profile 1

Senior AppSecurity Engineer/Penetration Tester

$4500 / mo
≈ $54000 / year net
Security · More than 10 years of experience · B2 - Upper Intermediate · Published today
Ukraine · Office or remote
• Led application security assessments of web/mobile applications and REST API as part of the secure SDLC
• Conducted security reviews of authentication, authorization, session management, and input validation
• Integrated SAST, DAST, and SCA tools into CI/CD pipelines to automate vulnerability detection
• Identified and exploited vulnerabilities including Broken Access Control, IDOR, SQL Injection, XSS, and business logic flaws using Burp Suite Professional
• Established vulnerability management processes including triage, risk prioritization, and remediation tracking
• Collaborated with development teams on vulnerability remediation and conducted re-testing to validate fixes
• Performed secure code reviews and provided developer guidance on secure coding practices
Highlights
• Reduced application security risk by identifying and remediating high-impact vulnerabilities across web, API, and mobile surfaces throughout the SDLC
• Improved development team security awareness through secure coding guidelines and internal AppSec training sessions
• Accelerated vulnerability remediation by establishing a structured vulnerability management workflow with clear SLA, risk classification, and remediation tracking
• Strengthened CI/CD security posture by integrating automated SAST, DAST, and SCA tools into development pipelines
• Enhanced authorization and access control across products by conducting systematic OWASP ASVS-based security assessments
Read more
Skills
Secure SDLC 11y Threat Detection 11y Web Application Pentesting 11y API Testing 11y Penetration Testing 11y Vulnerability Scanning 11y OWASP TOP 10 11y BurpSuite 11y Nessus 11y SAST/DAST 11y + 4 more
Nmap 11y Secure Code Review 5y Mobile Application Security 5y Cloud Security 5y
See public profile 15

OSINT аналітик, SOC L-1

$400 / mo
≈ $4800 / year net
Information Security · No experience · B2 - Upper Intermediate · Published today
Ukraine, Kyiv · Office or remote
Практика у ТОВ "Центр інформаційної та технічної підтримки "Сапфоріс"". Здійснювала аналіз корпоративної структури IT-компанії та процеси інформаційної безпеки, досліджувала продуктовий портфель ESET і моделювала підходи до захисту IT-інфраструктури. У межах практичної діяльності виконувала розгортання та налаштування системи централізованого управління безпекою, будувала структуру IT-компанії з використанням статичних і динамічних груп, автоматизації через тригери, налаштовувала систему сповіщень і дашборти для моніторингу кіберзагроз.
Read more
Skills
CTF player 1y Python OSINT ISO 27001 SIEM
Domains
Doesn’t consider: Gambling
See public profile 0

Security Engineer / Penetration Tester

$1500 / mo
≈ $18000 / year net
Security · 3.5 years of experience · C1 - Advanced · Published today
Ukraine · Only remote
3.5+ years in software development (multiple languages, diverse projects)

🧠 Top 1% on TryHackMe

Discovered 20+ 0-day vulnerabilities in open-source projects to prove my skills

Built my own pentesting tools : JWT-Phantom / Visual OCR Hunter

Background in Computer Science

Excellent knowledge of English
Read more
Skills
JavaScript 3.5y Golang 2y Penetration Testing 2y
See public profile 0

Security Engineer / Penetration Tester/ DevSecOps / SOC

$1500 / mo
≈ $18000 / year net
Security · 3 years of experience · C1 - Advanced · Published today
Ukraine · Office or remote
I help technology companies build secure cloud-native platforms where security is embedded directly into infrastructure, development pipelines, and production environments. My work focuses on integrating DevSecOps practices, cloud security controls, and application security principles to protect modern distributed systems without slowing down engineering velocity.
With hands-on experience securing AI infrastructure and fintech platforms processing real financial transactions, I bridge the gap between infrastructure engineering and cybersecurity by implementing security directly into cloud architecture, CI/CD pipelines, and application environments.

Strategic Impact
• Cloud Security Architecture: Designed and secured multi-tenant AWS environments with strict IAM policies, network segmentation, and hardened infrastructure configurations to minimize privilege escalation and lateral movement risks.
• Secure DevOps Transformation: Integrated security practices into CI/CD pipelines (GitHub Actions), implementing secret management, protected deployments, and secure build processes.
• Application & Infrastructure Protection: Implemented security controls including webhook validation, rate limiting, secure API patterns, and database access governance for production systems handling financial transactions.
• Operational Security Visibility: Enabled centralized logging, monitoring, and incident visibility across cloud infrastructure to improve detection and response capabilities.

Core Expertise
• Cloud Security Engineering:
Secure-by-design architectures across AWS, Azure, and GCP environments including IAM governance, network isolation, and infrastructure hardening.
• DevSecOps & Secure Development:
Embedding security into CI/CD pipelines, Secure SDLC practices, infrastructure-as-code security, and automated deployment governance.
• Application Security:
Mitigating OWASP Top 10 risks through secure API design, input validation, authentication controls, and rate limiting.
• Offensive & Defensive Security:
Combining penetration testing mindset with vulnerability assessment and security monitoring to identify and reduce attack surface.
• Security Operations:
Security monitoring, SIEM integration, incident response support, and vulnerability management across cloud-native environments.
Highlights
Network Security Engineer (Feb 2024 – Present)
• Designed and secured AWS cloud architecture for a multi-tenant AI platform using IAM role separation, VPC isolation, and network segmentation to reduce lateral movement risks
• Implemented least-privilege access policies and identity governance across services and CI/CD pipelines, minimizing excessive permissions across cloud infrastructure
• Hardened containerized workloads using Docker security best practices and minimal base images, reducing container vulnerability exposure
• Secured sensitive data storage by implementing strict S3 bucket policies, encryption controls, and restricted public access configurations
• Implemented centralized logging and monitoring using AWS CloudWatch and structured application logs to improve security visibility and incident response capabilities
• Designed secure ingestion and validation mechanisms for RAG-based AI infrastructure, preventing cross-tenant data exposure
• Integrated DevSecOps practices into CI/CD pipelines (GitHub Actions), including secrets management and controlled deployment permissions
• Conducted infrastructure security reviews and vulnerability assessments to identify cloud misconfigurations and reduce attack surface
DevSecOps Engineer (Feb 2023 – Jan 2024)
• Designed and secured AWS infrastructure with IAM role separation, environment isolation, and network-level access controls
• Built secure CI/CD pipelines using GitHub Actions with protected branches, secret encryption, and controlled production deployments
• Reduced deployment time from 4 hours to 25 minutes while maintaining security controls and compliance with internal security policies
• Implemented secure Stripe webhook validation with replay attack protection and idempotent processing for financial transaction systems
• Hardened PostgreSQL infrastructure with RBAC access controls and query optimization, improving API response time by 40%
• Implemented Redis-based rate limiting and abuse prevention mechanisms to protect APIs from brute-force and traffic spikes
• Enabled centralized logging and monitoring using AWS CloudWatch and application audit logs for improved incident detection
• Conducted vulnerability assessments aligned with OWASP Top 10 to reduce application-layer risks
Looking for
I'm seeking a leadership role where I can drive proactive, business-aligned security rather than respond to incidents.

I value hybrid work, Agile teams (Scrum/Kanban), and the ability to shape processes and make strategic team decisions.

I’m drawn to companies that invest in security early and support annual performance and salary reviews, clear career growth, and essential benefits like health insurance.

I bring deep experience in compliance, cloud, and security engineering, and I’m ready to lead with impact.
Read more
Skills
Information Security 3.5y Cybersecurity 3.5y Network Security 3y DevSecOps 2.5y AWS 3y OWASP 3y ISO 27001 3y Penetration Testing 2.5y SIEM 3y GCP (Google Cloud Platform) 2y + 10 more
Microsoft Azure 2.5y IT Security 3y Vulnerability Management 3y Incident Response 2.5y Application Security 3.5y K8s 3y Python 4y Cloud Security 3y IAM 3y TCP/IP 4.5y
Domains
Doesn’t consider: Adult, Dating
See public profile 22

Penetration Tester / Cybersecurity anlyst

$800 / mo
≈ $9600 / year net
Penetration Tester · 1.5 years of experience · B1 - Intermediate · Published today
Ukraine, Lviv · Office or remote
Vulnerability Assessment & Network Analysis

Conducted network reconnaissance and port scanning on real-world targets using Nmap, Masscan, and Shodan/Censys — identifying exposed services, open ports, and misconfigured infrastructure.
Performed vulnerability assessments of network infrastructure, analyzing attack surfaces and flagging security weaknesses for remediation.
Participated in active cyber communities, collaborating on security research and knowledge sharing with other specialists.

OSINT Investigations

Gathered and analyzed open-source intelligence on real companies and individuals using SpiderFoot — mapping digital footprints, identifying exposed assets, leaked credentials, and publicly available sensitive data.
Applied OSINT methodologies to build detailed profiles of targets: domains, subdomains, emails, social accounts, and infrastructure connections.

Security Tools & Lab Practice

Hands-on experience with Burp Suite for web application security analysis in controlled lab environments.
Practiced exploitation techniques using Metasploit and Social Engineering Toolkit (SET) in isolated lab setups.
Working knowledge of Kali Linux as primary OS for security testing workflows.
Highlights
Completed an intensive OSINT course at Molfar Intelligence Institute — one of Ukraine's leading open-source intelligence organizations. Ranked 1st out of 150 students across the full course curriculum, covering end-to-end OSINT methodology: target profiling, digital footprint analysis, infrastructure mapping, and intelligence reporting.
Read more
Skills
Kali Linux 1.5y OSINT 1.5y Nmap 1.5y BurpSuite 1.5y John the Ripper 1.5y Threat Intelligence 1.5y Metasploit 1.5y Social engineering 1.5y Network Security 1.5y
Domains
Doesn’t consider: Gambling
See public profile 0

Java Developer

$4000 / mo
≈ $48000 / year net
Java, Penetration Tester · 8 years of experience · B2 - Upper Intermediate · Published today
Ukraine · Office or remote
Experienced Software Engineer with over 8 years of hands-on experience in developing scalable and reliable applications using Java SE/EE and a broad range of modern Java frameworks and technologies.

I bring strong object-oriented programming skills, deep understanding of Java core libraries, and a solid grasp of software engineering principles such as SOLID, DRY, KISS, and YAGNI. My approach is grounded in best practices and design excellence, leveraging GoF design patterns and robust architectural principles to deliver high-quality, maintainable code.

I have practical experience with both RDBMS (PostgreSQL, MySQL) and NoSQL solutions (Redis, MongoDB), and a solid understanding of software testing techniques, including unit and functional testing.

Familiar with the Agile (Scrum/Kanban) development process and full software development life cycle (SDLC). I am comfortable working in distributed teams.

Highly self-motivated, proactive, and goal-oriented, I consistently focus on delivering business value through robust and thoughtful technical solutions.
Looking for
- Friendly team.
- Opportunities for growth and learning.
- Modern tools and technologies.
Read more
Skills
Spring Boot 5y Spring Data Spring Web Git Maven Kubernetes Spring Framework Spring Cloud Spring Security JUnit + 8 more
Rest Assured Microservices JDBC Tomcat REST API soap NoSQL Java
See public profile 9

Information Security Manager

$4000 / mo
≈ $48000 / year net
In passive search
Security · More than 10 years of experience · B2 - Upper Intermediate · Published today
Ukraine, Lviv · Only remote
Led cybersecurity initiatives, building and implementing a comprehensive Information Security Management System (ISMS) from scratch, compliant with international security standards and integrated into the company's core business processes.

Skills:
- Develop, implement and maintain IT security policies, standards and procedures.
- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry best practices and regulatory requirements (e.g. ISO 27001, SOC 2 Type 2, DORA, TISAX, GDPR).
- Implement and monitor security controls across various IT systems including networks, servers, applications and endpoints (EDR, NGAV, NGFW, WAF, SIEM, vulnerability scanning).
- Manage and respond to security incidents, including post-incident investigation and analysis.
- Conduct regular risk assessments.
- Providing full security training for company specialists.

Qualifications:
- 20 years of experience in IT, compliance and security.
- Deep knowledge of security frameworks and standards (ISO 27001, SOC2, TISAX, EU AI Act).
- CISSP, ISMS Internal Auditor, Risk Management certificates.
Read more
Skills
NGFW 11y Vulnerability Management 11y Security policy development 11y CISSP 11y Team Management 11y Risk Management 11y SOC 2 11y Information Security 11y Security Compliance 11y EDR 11y + 13 more
WAF 11y ISO 27001 Certification 11y ISO 27001 11y Cybersecurity 11y SIEM Security 11y Incident Response 11y AWS Antivirus 11y DLP 11y Azure Auditing and Compliance 11y Cybersecurity Compliance Management 11y
See public profile 3

SOC tier 1

$600 / mo
≈ $7200 / year net
Security · 1 year of experience · B1 - Intermediate · Published today
Ukraine · Only remote
Я junior-фахівець з кібербезпеки з практичним досвідом у напрямках Red Team, Blue Team та побудови лабораторних середовищ для моделювання атак і детекції. Маю досвід проведення авторизованого пентесту інфраструктури (web-ресурси, Microsoft Azure, GitLab, Joomla), в межах якого виявив критичні конфігураційні помилки та SQL Injection, що дозволяли отримати адміністративний доступ до системи. За результатами підготував детальний звіт з рекомендаціями, які були впроваджені замовником.

Паралельно працюю над розробкою Red & Blue Team лабораторій (понад 28 сценаріїв), що охоплюють атаки на Windows-інфраструктуру та Active Directory: credential dumping (Mimikatz), Pass-the-Hash, DCSync, lateral movement, persistence, privilege escalation. У Blue Team частині реалізую сценарії детекції на основі логів Windows та Sysmon, налаштовую правила в SIEM, виконую аналіз інцидентів та мапування подій до MITRE ATT&CK.

Маю практичний досвід аналізу логів, роботи з use case’ами детекції, дослідження хибнопозитивних спрацювань та оптимізації правил. Фокусуюсь на побудові повного SOC-циклу: збір телеметрії, виявлення події, первинний тріаж, визначення критичності, документування та ескалація.

Зайняв 4 місце на National Cybersecurity CTF 2025 (TOP-1 серед соло-команд, 23/23 задачі), що підтверджує сильну технічну базу та вміння працювати з різними типами загроз (web, auth bypass, криптографія, інфраструктурні вразливості).

Також самостійно розробив антивірус для Windows на Rust (kozhuSHIELD, 100/100), який реалізує багатопотокове сканування, контроль файлової системи в реальному часі та інтеграцію з VirusTotal API.

Наразі орієнтуюсь на позицію SOC Analyst (Tier 1), де можу поєднати знання атак з практикою моніторингу, тріажу інцидентів та побудови ефективних механізмів детекції.
Read more
Skills
SOC 1y Penetration Testing 1y Splunk 1y Wazuh 1y MITRE ATT&CK 1y Active Directory 1y Nmap 1y InfoSec 1y
See public profile 0

Junior QA

$1000 / mo
≈ $12000 / year net
QA, Security · 6 months · B1 - Intermediate · Published today
Ukraine, Lviv · Office or remote
Developer
Team "SomeZnimav"
01.09.2022 - 12.12.2022
Project work on the subject “Teamwork”, defended in the office of SoftServe.
Presentation of the work - canva (If necessary)

Manual QA
Indie games / idle (WEB & MOBILE)
20.02.2024 - 17.06.2024
Worked out the basic functionality of the game, before the release of the update, the stability and performance of all components of the program, finding and transmitting errors. Functional, regression, ad hoc, critical path testing.

Certificate QA marathon
GoIT
12.12.2022 - 31.12.2022
A marathon that I have completed completely.
Gained skills in creating and filling out Test cases / Bug Reports on practical tasks in Jira/TestRail.

Process administrator & Update tester
Rage Multiplayer
01.05.2023 - 07.09.2023
Regression testing, smoke testing, new features. Administration of test documentation and patch notes

Certificate Packet Analysis - Wireshark
Cyber Million
14.04.2024

Certificate Pentest Report for Juice Shop
OWASP Juice shop
13.05.2024

Certificate Portswigger
File path traversal, DOM XSS, Reflected XSS, Stored XSS
24.03.2024 - 20.04.2024

Certificate Engensec
Course name: Ethical hacking
11.05.2024

Certificate Cyber Million: Splunk
immersive labs
Defensive Security Operations
11.08.2024

Cyber Million: Log Analysis
immersive labs Cyber Million
Defensive Security Operations
19.08.2024

Certificate Detect, Respond, and Recover from Cloud Cybersecurity Attacks
Google cloud
05.11.2024

Certificate Тестирование ПО с нуля. Теория + Практика
Stepik
20.10.2024

SmallTalk
English Speaking Level Test B2
26.07.2024
Highlights
A young IT specialist with initial experience in software testing, development and network security. Now I am getting a degree in Cybersecurity at Lviv Polytechnic National University, where I received basic knowledge of programming, network technologies and information security with data encryption, which gives me a deep knowledge of "how exactly" programs work and "move." I have experience working in a team on university projects, in particular with the successful presentation of work in the office of SoftServe, which developed my coordination and communication skills within the framework of joint work, as well as the presentation of CPSI for one of the critical infrastructures of the city.
I have skills in creating test cases, writing bug reports, as well as analyzing the stability and performance of software components. The experience of administering projects and testing updates taught me attentiveness to details and the ability to quickly adapt to changes in requirements. I work confidently with tools such as Jira, TestRail, and also have basic knowledge in Python, C, C #, SQL, and analytical tools for data processing. I also have experience with WEB & Program game QA.
I am fluent in Ukrainian and Russian, the level of English is B1, which allows you to work with technical documentation and take English-language courses, I strive to reproduce the level of English also orally. I have certificates on the basics of ethical hacking, network packet analysis (Wireshark), logs (Splunk), as well as software testing theory and work with cloud platforms, which confirm my desire to constantly improve my knowledge.
Open to new challenges and striving to realize myself in the IT field, developing in roles that require technical flexibility, attention to detail and the ability to learn new technologies.
Looking for
In a potential job, I would like to apply my skills and learn new ones from the company's mentors. I am ready to devote my time to this as much as possible. And after that, I would like to stay with the company/project and move forward with the team.
Read more
Skills
TestRail SQL QA C# phpMyAdmin Python Pandas Wireshark BurpSuite Web testing Bug Reporting + 6 more
QA Manual CSS HTML MySQL Windows REST API
See public profile 0
  • 1
  • 2
  • 3
  • 4
  • …
  • 70
  • 71

Filters

Region

Speaks Ukrainian

Use to find Ukrainians abroad

Work experience

...

Salary expectations [?]

$ ...

Category

Select one or more
Development
Other (tech)
Other (non tech)

English level

Employment

Format

Reset all


There was an error. Reload the page and try again.
magic@djinni.co
Terms of Use
Suggest an idea
Remote tech jobs in Europe
We use cookies to improve your experience.
Learn more