Candidates 705
$3000
/ mo
≈ $36000 / year net
Security
·
4 years of experience
·
B2 - Upper Intermediate
·
Published
today
Ukraine, Lviv
·
Only remote
Expirience:
- MSSP project
- Healtcheck
- Create documentaion
- provide workshop session
- Typical SOC Stuff
Currently work in an international Company
- Building SOC
- Create documentation
- Configure SIEM and VM
- part of IR team
- Prepare company for Audit
- Audit Log source to reduce license usage
- Maintain SIEM solution
- Working with EDR
- MSSP project
- Healtcheck
- Create documentaion
- provide workshop session
- Typical SOC Stuff
Currently work in an international Company
- Building SOC
- Create documentation
- Configure SIEM and VM
- part of IR team
- Prepare company for Audit
- Audit Log source to reduce license usage
- Maintain SIEM solution
- Working with EDR
Looking for
Looking for an opportunity to grow
Skills
Cybersecurity
SOC
Information Security
Analytical skills
Security
IT Security
$4500
/ mo
≈ $54000 / year net
Security
·
More than 10 years of experience
·
B2 - Upper Intermediate
·
Published
today
Ukraine
·
Office or remote
• Led application security assessments of web/mobile applications and REST API as part of the secure SDLC
• Conducted security reviews of authentication, authorization, session management, and input validation
• Integrated SAST, DAST, and SCA tools into CI/CD pipelines to automate vulnerability detection
• Identified and exploited vulnerabilities including Broken Access Control, IDOR, SQL Injection, XSS, and business logic flaws using Burp Suite Professional
• Established vulnerability management processes including triage, risk prioritization, and remediation tracking
• Collaborated with development teams on vulnerability remediation and conducted re-testing to validate fixes
• Performed secure code reviews and provided developer guidance on secure coding practices
• Conducted security reviews of authentication, authorization, session management, and input validation
• Integrated SAST, DAST, and SCA tools into CI/CD pipelines to automate vulnerability detection
• Identified and exploited vulnerabilities including Broken Access Control, IDOR, SQL Injection, XSS, and business logic flaws using Burp Suite Professional
• Established vulnerability management processes including triage, risk prioritization, and remediation tracking
• Collaborated with development teams on vulnerability remediation and conducted re-testing to validate fixes
• Performed secure code reviews and provided developer guidance on secure coding practices
Highlights
• Reduced application security risk by identifying and remediating high-impact vulnerabilities across web, API, and mobile surfaces throughout the SDLC• Improved development team security awareness through secure coding guidelines and internal AppSec training sessions
• Accelerated vulnerability remediation by establishing a structured vulnerability management workflow with clear SLA, risk classification, and remediation tracking
• Strengthened CI/CD security posture by integrating automated SAST, DAST, and SCA tools into development pipelines
• Enhanced authorization and access control across products by conducting systematic OWASP ASVS-based security assessments
Skills
Secure SDLC
11y
Threat Detection
11y
Web Application Pentesting
11y
API Testing
11y
Penetration Testing
11y
Vulnerability Scanning
11y
OWASP TOP 10
11y
BurpSuite
11y
Nessus
11y
SAST/DAST
11y
+ 4 more
Nmap
11y
Secure Code Review
5y
Mobile Application Security
5y
Cloud Security
5y
$400
/ mo
≈ $4800 / year net
Information Security
·
No experience
·
B2 - Upper Intermediate
·
Published
today
Ukraine, Kyiv
·
Office or remote
Практика у ТОВ "Центр інформаційної та технічної підтримки "Сапфоріс"". Здійснювала аналіз корпоративної структури IT-компанії та процеси інформаційної безпеки, досліджувала продуктовий портфель ESET і моделювала підходи до захисту IT-інфраструктури. У межах практичної діяльності виконувала розгортання та налаштування системи централізованого управління безпекою, будувала структуру IT-компанії з використанням статичних і динамічних груп, автоматизації через тригери, налаштовувала систему сповіщень і дашборти для моніторингу кіберзагроз.
Skills
CTF player
1y
Python
OSINT
ISO 27001
SIEM
Domains
Doesn’t consider: Gambling
$1500
/ mo
≈ $18000 / year net
Security
·
3.5 years of experience
·
C1 - Advanced
·
Published
today
Ukraine
·
Only remote
3.5+ years in software development (multiple languages, diverse projects)
🧠 Top 1% on TryHackMe
Discovered 20+ 0-day vulnerabilities in open-source projects to prove my skills
Built my own pentesting tools : JWT-Phantom / Visual OCR Hunter
Background in Computer Science
Excellent knowledge of English
🧠 Top 1% on TryHackMe
Discovered 20+ 0-day vulnerabilities in open-source projects to prove my skills
Built my own pentesting tools : JWT-Phantom / Visual OCR Hunter
Background in Computer Science
Excellent knowledge of English
Skills
JavaScript
3.5y
Golang
2y
Penetration Testing
2y
$1500
/ mo
≈ $18000 / year net
Security
·
3 years of experience
·
C1 - Advanced
·
Published
today
Ukraine
·
Office or remote
I help technology companies build secure cloud-native platforms where security is embedded directly into infrastructure, development pipelines, and production environments. My work focuses on integrating DevSecOps practices, cloud security controls, and application security principles to protect modern distributed systems without slowing down engineering velocity.
With hands-on experience securing AI infrastructure and fintech platforms processing real financial transactions, I bridge the gap between infrastructure engineering and cybersecurity by implementing security directly into cloud architecture, CI/CD pipelines, and application environments.
Strategic Impact
• Cloud Security Architecture: Designed and secured multi-tenant AWS environments with strict IAM policies, network segmentation, and hardened infrastructure configurations to minimize privilege escalation and lateral movement risks.
• Secure DevOps Transformation: Integrated security practices into CI/CD pipelines (GitHub Actions), implementing secret management, protected deployments, and secure build processes.
• Application & Infrastructure Protection: Implemented security controls including webhook validation, rate limiting, secure API patterns, and database access governance for production systems handling financial transactions.
• Operational Security Visibility: Enabled centralized logging, monitoring, and incident visibility across cloud infrastructure to improve detection and response capabilities.
Core Expertise
• Cloud Security Engineering:
Secure-by-design architectures across AWS, Azure, and GCP environments including IAM governance, network isolation, and infrastructure hardening.
• DevSecOps & Secure Development:
Embedding security into CI/CD pipelines, Secure SDLC practices, infrastructure-as-code security, and automated deployment governance.
• Application Security:
Mitigating OWASP Top 10 risks through secure API design, input validation, authentication controls, and rate limiting.
• Offensive & Defensive Security:
Combining penetration testing mindset with vulnerability assessment and security monitoring to identify and reduce attack surface.
• Security Operations:
Security monitoring, SIEM integration, incident response support, and vulnerability management across cloud-native environments.
With hands-on experience securing AI infrastructure and fintech platforms processing real financial transactions, I bridge the gap between infrastructure engineering and cybersecurity by implementing security directly into cloud architecture, CI/CD pipelines, and application environments.
Strategic Impact
• Cloud Security Architecture: Designed and secured multi-tenant AWS environments with strict IAM policies, network segmentation, and hardened infrastructure configurations to minimize privilege escalation and lateral movement risks.
• Secure DevOps Transformation: Integrated security practices into CI/CD pipelines (GitHub Actions), implementing secret management, protected deployments, and secure build processes.
• Application & Infrastructure Protection: Implemented security controls including webhook validation, rate limiting, secure API patterns, and database access governance for production systems handling financial transactions.
• Operational Security Visibility: Enabled centralized logging, monitoring, and incident visibility across cloud infrastructure to improve detection and response capabilities.
Core Expertise
• Cloud Security Engineering:
Secure-by-design architectures across AWS, Azure, and GCP environments including IAM governance, network isolation, and infrastructure hardening.
• DevSecOps & Secure Development:
Embedding security into CI/CD pipelines, Secure SDLC practices, infrastructure-as-code security, and automated deployment governance.
• Application Security:
Mitigating OWASP Top 10 risks through secure API design, input validation, authentication controls, and rate limiting.
• Offensive & Defensive Security:
Combining penetration testing mindset with vulnerability assessment and security monitoring to identify and reduce attack surface.
• Security Operations:
Security monitoring, SIEM integration, incident response support, and vulnerability management across cloud-native environments.
Highlights
Network Security Engineer (Feb 2024 – Present)• Designed and secured AWS cloud architecture for a multi-tenant AI platform using IAM role separation, VPC isolation, and network segmentation to reduce lateral movement risks
• Implemented least-privilege access policies and identity governance across services and CI/CD pipelines, minimizing excessive permissions across cloud infrastructure
• Hardened containerized workloads using Docker security best practices and minimal base images, reducing container vulnerability exposure
• Secured sensitive data storage by implementing strict S3 bucket policies, encryption controls, and restricted public access configurations
• Implemented centralized logging and monitoring using AWS CloudWatch and structured application logs to improve security visibility and incident response capabilities
• Designed secure ingestion and validation mechanisms for RAG-based AI infrastructure, preventing cross-tenant data exposure
• Integrated DevSecOps practices into CI/CD pipelines (GitHub Actions), including secrets management and controlled deployment permissions
• Conducted infrastructure security reviews and vulnerability assessments to identify cloud misconfigurations and reduce attack surface
DevSecOps Engineer (Feb 2023 – Jan 2024)
• Designed and secured AWS infrastructure with IAM role separation, environment isolation, and network-level access controls
• Built secure CI/CD pipelines using GitHub Actions with protected branches, secret encryption, and controlled production deployments
• Reduced deployment time from 4 hours to 25 minutes while maintaining security controls and compliance with internal security policies
• Implemented secure Stripe webhook validation with replay attack protection and idempotent processing for financial transaction systems
• Hardened PostgreSQL infrastructure with RBAC access controls and query optimization, improving API response time by 40%
• Implemented Redis-based rate limiting and abuse prevention mechanisms to protect APIs from brute-force and traffic spikes
• Enabled centralized logging and monitoring using AWS CloudWatch and application audit logs for improved incident detection
• Conducted vulnerability assessments aligned with OWASP Top 10 to reduce application-layer risks
Looking for
I'm seeking a leadership role where I can drive proactive, business-aligned security rather than respond to incidents.I value hybrid work, Agile teams (Scrum/Kanban), and the ability to shape processes and make strategic team decisions.
I’m drawn to companies that invest in security early and support annual performance and salary reviews, clear career growth, and essential benefits like health insurance.
I bring deep experience in compliance, cloud, and security engineering, and I’m ready to lead with impact.
Skills
Information Security
3.5y
Cybersecurity
3.5y
Network Security
3y
DevSecOps
2.5y
AWS
3y
OWASP
3y
ISO 27001
3y
Penetration Testing
2.5y
SIEM
3y
GCP (Google Cloud Platform)
2y
+ 10 more
Microsoft Azure
2.5y
IT Security
3y
Vulnerability Management
3y
Incident Response
2.5y
Application Security
3.5y
K8s
3y
Python
4y
Cloud Security
3y
IAM
3y
TCP/IP
4.5y
Domains
Doesn’t consider: Adult, Dating
$800
/ mo
≈ $9600 / year net
Penetration Tester
·
1.5 years of experience
·
B1 - Intermediate
·
Published
today
Ukraine, Lviv
·
Office or remote
Vulnerability Assessment & Network Analysis
Conducted network reconnaissance and port scanning on real-world targets using Nmap, Masscan, and Shodan/Censys — identifying exposed services, open ports, and misconfigured infrastructure.
Performed vulnerability assessments of network infrastructure, analyzing attack surfaces and flagging security weaknesses for remediation.
Participated in active cyber communities, collaborating on security research and knowledge sharing with other specialists.
OSINT Investigations
Gathered and analyzed open-source intelligence on real companies and individuals using SpiderFoot — mapping digital footprints, identifying exposed assets, leaked credentials, and publicly available sensitive data.
Applied OSINT methodologies to build detailed profiles of targets: domains, subdomains, emails, social accounts, and infrastructure connections.
Security Tools & Lab Practice
Hands-on experience with Burp Suite for web application security analysis in controlled lab environments.
Practiced exploitation techniques using Metasploit and Social Engineering Toolkit (SET) in isolated lab setups.
Working knowledge of Kali Linux as primary OS for security testing workflows.
Conducted network reconnaissance and port scanning on real-world targets using Nmap, Masscan, and Shodan/Censys — identifying exposed services, open ports, and misconfigured infrastructure.
Performed vulnerability assessments of network infrastructure, analyzing attack surfaces and flagging security weaknesses for remediation.
Participated in active cyber communities, collaborating on security research and knowledge sharing with other specialists.
OSINT Investigations
Gathered and analyzed open-source intelligence on real companies and individuals using SpiderFoot — mapping digital footprints, identifying exposed assets, leaked credentials, and publicly available sensitive data.
Applied OSINT methodologies to build detailed profiles of targets: domains, subdomains, emails, social accounts, and infrastructure connections.
Security Tools & Lab Practice
Hands-on experience with Burp Suite for web application security analysis in controlled lab environments.
Practiced exploitation techniques using Metasploit and Social Engineering Toolkit (SET) in isolated lab setups.
Working knowledge of Kali Linux as primary OS for security testing workflows.
Highlights
Completed an intensive OSINT course at Molfar Intelligence Institute — one of Ukraine's leading open-source intelligence organizations. Ranked 1st out of 150 students across the full course curriculum, covering end-to-end OSINT methodology: target profiling, digital footprint analysis, infrastructure mapping, and intelligence reporting.
Skills
Kali Linux
1.5y
OSINT
1.5y
Nmap
1.5y
BurpSuite
1.5y
John the Ripper
1.5y
Threat Intelligence
1.5y
Metasploit
1.5y
Social engineering
1.5y
Network Security
1.5y
Domains
Doesn’t consider: Gambling
$4000
/ mo
≈ $48000 / year net
Java, Penetration Tester
·
8 years of experience
·
B2 - Upper Intermediate
·
Published
today
Ukraine
·
Office or remote
Experienced Software Engineer with over 8 years of hands-on experience in developing scalable and reliable applications using Java SE/EE and a broad range of modern Java frameworks and technologies.
I bring strong object-oriented programming skills, deep understanding of Java core libraries, and a solid grasp of software engineering principles such as SOLID, DRY, KISS, and YAGNI. My approach is grounded in best practices and design excellence, leveraging GoF design patterns and robust architectural principles to deliver high-quality, maintainable code.
I have practical experience with both RDBMS (PostgreSQL, MySQL) and NoSQL solutions (Redis, MongoDB), and a solid understanding of software testing techniques, including unit and functional testing.
Familiar with the Agile (Scrum/Kanban) development process and full software development life cycle (SDLC). I am comfortable working in distributed teams.
Highly self-motivated, proactive, and goal-oriented, I consistently focus on delivering business value through robust and thoughtful technical solutions.
I bring strong object-oriented programming skills, deep understanding of Java core libraries, and a solid grasp of software engineering principles such as SOLID, DRY, KISS, and YAGNI. My approach is grounded in best practices and design excellence, leveraging GoF design patterns and robust architectural principles to deliver high-quality, maintainable code.
I have practical experience with both RDBMS (PostgreSQL, MySQL) and NoSQL solutions (Redis, MongoDB), and a solid understanding of software testing techniques, including unit and functional testing.
Familiar with the Agile (Scrum/Kanban) development process and full software development life cycle (SDLC). I am comfortable working in distributed teams.
Highly self-motivated, proactive, and goal-oriented, I consistently focus on delivering business value through robust and thoughtful technical solutions.
Looking for
- Friendly team.- Opportunities for growth and learning.
- Modern tools and technologies.
Skills
Spring Boot
5y
Spring Data
Spring Web
Git
Maven
Kubernetes
Spring Framework
Spring Cloud
Spring Security
JUnit
+ 8 more
Rest Assured
Microservices
JDBC
Tomcat
REST API
soap
NoSQL
Java
$4000
/ mo
≈ $48000 / year net
In passive search
Security
·
More than 10 years of experience
·
B2 - Upper Intermediate
·
Published
today
Ukraine, Lviv
·
Only remote
Led cybersecurity initiatives, building and implementing a comprehensive Information Security Management System (ISMS) from scratch, compliant with international security standards and integrated into the company's core business processes.
Skills:
- Develop, implement and maintain IT security policies, standards and procedures.
- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry best practices and regulatory requirements (e.g. ISO 27001, SOC 2 Type 2, DORA, TISAX, GDPR).
- Implement and monitor security controls across various IT systems including networks, servers, applications and endpoints (EDR, NGAV, NGFW, WAF, SIEM, vulnerability scanning).
- Manage and respond to security incidents, including post-incident investigation and analysis.
- Conduct regular risk assessments.
- Providing full security training for company specialists.
Qualifications:
- 20 years of experience in IT, compliance and security.
- Deep knowledge of security frameworks and standards (ISO 27001, SOC2, TISAX, EU AI Act).
- CISSP, ISMS Internal Auditor, Risk Management certificates.
Skills:
- Develop, implement and maintain IT security policies, standards and procedures.
- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry best practices and regulatory requirements (e.g. ISO 27001, SOC 2 Type 2, DORA, TISAX, GDPR).
- Implement and monitor security controls across various IT systems including networks, servers, applications and endpoints (EDR, NGAV, NGFW, WAF, SIEM, vulnerability scanning).
- Manage and respond to security incidents, including post-incident investigation and analysis.
- Conduct regular risk assessments.
- Providing full security training for company specialists.
Qualifications:
- 20 years of experience in IT, compliance and security.
- Deep knowledge of security frameworks and standards (ISO 27001, SOC2, TISAX, EU AI Act).
- CISSP, ISMS Internal Auditor, Risk Management certificates.
Skills
NGFW
11y
Vulnerability Management
11y
Security policy development
11y
CISSP
11y
Team Management
11y
Risk Management
11y
SOC 2
11y
Information Security
11y
Security Compliance
11y
EDR
11y
+ 13 more
WAF
11y
ISO 27001 Certification
11y
ISO 27001
11y
Cybersecurity
11y
SIEM
Security
11y
Incident Response
11y
AWS
Antivirus
11y
DLP
11y
Azure
Auditing and Compliance
11y
Cybersecurity Compliance Management
11y
$600
/ mo
≈ $7200 / year net
Security
·
1 year of experience
·
B1 - Intermediate
·
Published
today
Ukraine
·
Only remote
Я junior-фахівець з кібербезпеки з практичним досвідом у напрямках Red Team, Blue Team та побудови лабораторних середовищ для моделювання атак і детекції. Маю досвід проведення авторизованого пентесту інфраструктури (web-ресурси, Microsoft Azure, GitLab, Joomla), в межах якого виявив критичні конфігураційні помилки та SQL Injection, що дозволяли отримати адміністративний доступ до системи. За результатами підготував детальний звіт з рекомендаціями, які були впроваджені замовником.
Паралельно працюю над розробкою Red & Blue Team лабораторій (понад 28 сценаріїв), що охоплюють атаки на Windows-інфраструктуру та Active Directory: credential dumping (Mimikatz), Pass-the-Hash, DCSync, lateral movement, persistence, privilege escalation. У Blue Team частині реалізую сценарії детекції на основі логів Windows та Sysmon, налаштовую правила в SIEM, виконую аналіз інцидентів та мапування подій до MITRE ATT&CK.
Маю практичний досвід аналізу логів, роботи з use case’ами детекції, дослідження хибнопозитивних спрацювань та оптимізації правил. Фокусуюсь на побудові повного SOC-циклу: збір телеметрії, виявлення події, первинний тріаж, визначення критичності, документування та ескалація.
Зайняв 4 місце на National Cybersecurity CTF 2025 (TOP-1 серед соло-команд, 23/23 задачі), що підтверджує сильну технічну базу та вміння працювати з різними типами загроз (web, auth bypass, криптографія, інфраструктурні вразливості).
Також самостійно розробив антивірус для Windows на Rust (kozhuSHIELD, 100/100), який реалізує багатопотокове сканування, контроль файлової системи в реальному часі та інтеграцію з VirusTotal API.
Наразі орієнтуюсь на позицію SOC Analyst (Tier 1), де можу поєднати знання атак з практикою моніторингу, тріажу інцидентів та побудови ефективних механізмів детекції.
Паралельно працюю над розробкою Red & Blue Team лабораторій (понад 28 сценаріїв), що охоплюють атаки на Windows-інфраструктуру та Active Directory: credential dumping (Mimikatz), Pass-the-Hash, DCSync, lateral movement, persistence, privilege escalation. У Blue Team частині реалізую сценарії детекції на основі логів Windows та Sysmon, налаштовую правила в SIEM, виконую аналіз інцидентів та мапування подій до MITRE ATT&CK.
Маю практичний досвід аналізу логів, роботи з use case’ами детекції, дослідження хибнопозитивних спрацювань та оптимізації правил. Фокусуюсь на побудові повного SOC-циклу: збір телеметрії, виявлення події, первинний тріаж, визначення критичності, документування та ескалація.
Зайняв 4 місце на National Cybersecurity CTF 2025 (TOP-1 серед соло-команд, 23/23 задачі), що підтверджує сильну технічну базу та вміння працювати з різними типами загроз (web, auth bypass, криптографія, інфраструктурні вразливості).
Також самостійно розробив антивірус для Windows на Rust (kozhuSHIELD, 100/100), який реалізує багатопотокове сканування, контроль файлової системи в реальному часі та інтеграцію з VirusTotal API.
Наразі орієнтуюсь на позицію SOC Analyst (Tier 1), де можу поєднати знання атак з практикою моніторингу, тріажу інцидентів та побудови ефективних механізмів детекції.
Skills
SOC
1y
Penetration Testing
1y
Splunk
1y
Wazuh
1y
MITRE ATT&CK
1y
Active Directory
1y
Nmap
1y
InfoSec
1y
$1000
/ mo
≈ $12000 / year net
QA, Security
·
6 months
·
B1 - Intermediate
·
Published
today
Ukraine, Lviv
·
Office or remote
Developer
Team "SomeZnimav"
01.09.2022 - 12.12.2022
Project work on the subject “Teamwork”, defended in the office of SoftServe.
Presentation of the work - canva (If necessary)
Manual QA
Indie games / idle (WEB & MOBILE)
20.02.2024 - 17.06.2024
Worked out the basic functionality of the game, before the release of the update, the stability and performance of all components of the program, finding and transmitting errors. Functional, regression, ad hoc, critical path testing.
Certificate QA marathon
GoIT
12.12.2022 - 31.12.2022
A marathon that I have completed completely.
Gained skills in creating and filling out Test cases / Bug Reports on practical tasks in Jira/TestRail.
Process administrator & Update tester
Rage Multiplayer
01.05.2023 - 07.09.2023
Regression testing, smoke testing, new features. Administration of test documentation and patch notes
Certificate Packet Analysis - Wireshark
Cyber Million
14.04.2024
Certificate Pentest Report for Juice Shop
OWASP Juice shop
13.05.2024
Certificate Portswigger
File path traversal, DOM XSS, Reflected XSS, Stored XSS
24.03.2024 - 20.04.2024
Certificate Engensec
Course name: Ethical hacking
11.05.2024
Certificate Cyber Million: Splunk
immersive labs
Defensive Security Operations
11.08.2024
Cyber Million: Log Analysis
immersive labs Cyber Million
Defensive Security Operations
19.08.2024
Certificate Detect, Respond, and Recover from Cloud Cybersecurity Attacks
Google cloud
05.11.2024
Certificate Тестирование ПО с нуля. Теория + Практика
Stepik
20.10.2024
SmallTalk
English Speaking Level Test B2
26.07.2024
Team "SomeZnimav"
01.09.2022 - 12.12.2022
Project work on the subject “Teamwork”, defended in the office of SoftServe.
Presentation of the work - canva (If necessary)
Manual QA
Indie games / idle (WEB & MOBILE)
20.02.2024 - 17.06.2024
Worked out the basic functionality of the game, before the release of the update, the stability and performance of all components of the program, finding and transmitting errors. Functional, regression, ad hoc, critical path testing.
Certificate QA marathon
GoIT
12.12.2022 - 31.12.2022
A marathon that I have completed completely.
Gained skills in creating and filling out Test cases / Bug Reports on practical tasks in Jira/TestRail.
Process administrator & Update tester
Rage Multiplayer
01.05.2023 - 07.09.2023
Regression testing, smoke testing, new features. Administration of test documentation and patch notes
Certificate Packet Analysis - Wireshark
Cyber Million
14.04.2024
Certificate Pentest Report for Juice Shop
OWASP Juice shop
13.05.2024
Certificate Portswigger
File path traversal, DOM XSS, Reflected XSS, Stored XSS
24.03.2024 - 20.04.2024
Certificate Engensec
Course name: Ethical hacking
11.05.2024
Certificate Cyber Million: Splunk
immersive labs
Defensive Security Operations
11.08.2024
Cyber Million: Log Analysis
immersive labs Cyber Million
Defensive Security Operations
19.08.2024
Certificate Detect, Respond, and Recover from Cloud Cybersecurity Attacks
Google cloud
05.11.2024
Certificate Тестирование ПО с нуля. Теория + Практика
Stepik
20.10.2024
SmallTalk
English Speaking Level Test B2
26.07.2024
Highlights
A young IT specialist with initial experience in software testing, development and network security. Now I am getting a degree in Cybersecurity at Lviv Polytechnic National University, where I received basic knowledge of programming, network technologies and information security with data encryption, which gives me a deep knowledge of "how exactly" programs work and "move." I have experience working in a team on university projects, in particular with the successful presentation of work in the office of SoftServe, which developed my coordination and communication skills within the framework of joint work, as well as the presentation of CPSI for one of the critical infrastructures of the city.I have skills in creating test cases, writing bug reports, as well as analyzing the stability and performance of software components. The experience of administering projects and testing updates taught me attentiveness to details and the ability to quickly adapt to changes in requirements. I work confidently with tools such as Jira, TestRail, and also have basic knowledge in Python, C, C #, SQL, and analytical tools for data processing. I also have experience with WEB & Program game QA.
I am fluent in Ukrainian and Russian, the level of English is B1, which allows you to work with technical documentation and take English-language courses, I strive to reproduce the level of English also orally. I have certificates on the basics of ethical hacking, network packet analysis (Wireshark), logs (Splunk), as well as software testing theory and work with cloud platforms, which confirm my desire to constantly improve my knowledge.
Open to new challenges and striving to realize myself in the IT field, developing in roles that require technical flexibility, attention to detail and the ability to learn new technologies.
Looking for
In a potential job, I would like to apply my skills and learn new ones from the company's mentors. I am ready to devote my time to this as much as possible. And after that, I would like to stay with the company/project and move forward with the team.
Skills
TestRail
SQL
QA
C#
phpMyAdmin
Python Pandas
Wireshark
BurpSuite
Web testing
Bug Reporting
+ 6 more
QA Manual
CSS
HTML
MySQL
Windows
REST API