Candidates 139
$1000 / mo
≈ $12000 / year net
Penetration Tester
Ukraine · Kyiv · 6 months · Upper-Intermediate ·Published yesterday
Ukraine · Kyiv · 6 months · Upper-Intermediate ·Published yesterday
HTB CA 24 CTF - Top 4% on a very first try.
THM AoC 23 CTF - Successfully completed all CTF challenges.
The Youngest Chief Officer and Captain in the Company.
$1000 / mo
≈ $12000 / year net
Application Security Engineer
Ukraine · Kyiv · 6 months · Upper-Intermediate ·Published yesterday
Ukraine · Kyiv · 6 months · Upper-Intermediate ·Published yesterday
Working with web application forms, analysing requests, trying different types of sql injections to understand if web app is vulnerable for this attack, using sqlmap to check for possible sql injections. Trying to XSS web app to understand if there is possibility to compromise sensitive data.
$1150 / mo
≈ $13800 / year net
Network $ System & Security engineer
Ukraine · 2 years of experience · Pre-Intermediate ·Published yesterday
Ukraine · 2 years of experience · Pre-Intermediate ·Published yesterday
System administrator
Junior network support engineer
Technical support for clients
Access Engineer
Cyber Protection Infrastructure Support Specialist
Monitoring
I am interested in work related to the network, cloud services, cyber security
FortiGate Security
FortiGate Infrastructure
MTCNA
I want to join a team of smart people, learn and gain experience.
$5000 / mo
≈ $60000 / year net
Cyber Security Specialist | Cyber Security Analyst | Penetration Testing
Ukraine · More than 10 years of experience · Pre-Intermediate ·Published yesterday
Ukraine · More than 10 years of experience · Pre-Intermediate ·Published yesterday
1. Research (collection of intelligence information).
• Information gathering - network segmentation (analysis of the correct network structure)
• Collection of information - network equipment (Wi-Fi routers, switches, network router)
• Collection of information - servers, personal computers, laptops, tablets, phones.
• Collection of information - Operating systems, software, anti-virus protection, current security updates.
• Collection of information - Open services, network services, ports, protocols, etc.
2. Modeling threats.
• Determination of expected attack vectors taking into account business processes and activities of the company.
3. Vulnerability analysis.
• Analysis of vulnerabilities and threats (detection of vulnerabilities in security systems, applications and programs detected using specialized programs and utilities)
4. Exploitation of vulnerabilities.
• An attempt to use a discovered vulnerability in an organization's security system to simulate misconduct. Testing and attempting to gain control over the management of the information system.
5. Reporting.
• A well-documented test report with information about the vulnerabilities found, business risks and recommendations for their elimination.
6. Development of an audit plan.
• Step-by-step identification of found weaknesses in the company's protection. Implementation of modern methods of protection using software and hardware.
Microsoft Azure:
• Microsoft Defender for Endpoint;
• Microsoft Defender for Office 365;
• Microsoft DLP (Data Loss Prevention);
• Microsoft Purview;
• Microsoft Intune.
Amazon Web Services (AWS):
• AWS Identity & Access Management (IAM);
• AWS KMS;
• AWS CloudTrail;
• AWS Amazon CloudWatch;
• Amazon Inspector;
• Amazon Detective;
• AWS Amazon WAF;
• AWS Network Firewall;
• Amazon GuardDuty;
• AWS Cloud Security;
• AWS Shield;
• AWS Audit Manager.
$5000 / mo
≈ $60000 / year net
Penetration tester
Bulgaria · More than 10 years of experience · Upper-Intermediate ·Published yesterday · In passive search
Bulgaria · More than 10 years of experience · Upper-Intermediate ·Published yesterday · In passive search
Penetration tester
- penetration testing, testing authentication and authorization mechanisms, interaction with Blue-team, security assessment of external and internal systems, analysis and vulnerability assessment, etc.
TOV "AITYLOGIKA" 04/2019 - 04/2021
Information Security Specialist
• Conducting penetration tests
• Building secure infrastructures
• Development of training materials for user training
• Correction of existing infrastructures according to information security standards
PJSC "KZ "ANALITPRIBOR" 10/2015 - 04/2019
Head of IT Department
- Planning the development of the IT infrastructure of the holding and participation in its implementation;
- Control and accounting of licenses for software;
- Administration of servers hardware and software;
- System administration Bitrix24, development and writing of business processes, integration with third-party software (1C, Profitbase, etc);
- Coordination of work structural unit;
- Data backup and providing disaster recovery;
10/2010 - 10/2015
Many more...
- CSAS(Continuous - Security - Auditing - Specialist)
- Offensive Security Certified Professional (OSCP)
- C|EH (Certified Ethical Hacker)
- Business Process Management / MIM-Kyiv Business School
- EF SET English Certificate 69/100 (C1 Advanced)EF SET English Certificate 69/100 (C1 Advanced)
- NSE1/NSE2 Fortinet
- GXPN GIAC Exploit Researcher and Advanced Penetration Tester
$8000 / mo
≈ $96000 / year net
Information Security Officer, Head of Security, CISO,CSO
Ukraine · More than 10 years of experience · Advanced/Fluent ·Published yesterday · In passive search
Ukraine · More than 10 years of experience · Advanced/Fluent ·Published yesterday · In passive search
Experienced team lead in infrastructure and security.
Managed up to 25 senior engineers in remote/distributed team (US/Europe/India)
Hands-on experience with ISO27001, SOC2, GDPR audit/compliance, vulnerabilities testing, penetration test, writing security policies/roadmap and building control/evidence collection process
Ability to interact with all levels of stakeholders (from C-level or customers to operations team)
Led and implemented multi-millions dollars projects (data center design, cloud migration, worldwide WAN/SDWAN implementation)
Fluent English and French
Improved 3rd party security rating from 841 to 941 (out of 950)
First to obtain an Assurance Report on GDPR related controls from KPMG (in 2019, right after GDPR become mandatory)
I'm enjoying to work with a multicultural team in a remote working environment.
I'm not interested in relocating outside of Ukraine. Nor to work fulltime from an office.
$7500 / mo
≈ $90000 / year net
Cybersecurity Manager, CISO, SOC Manager, Threat Research, Detection Engineering
Ukraine · Kyiv · More than 10 years of experience · Advanced/Fluent ·Published yesterday · In passive search
Ukraine · Kyiv · More than 10 years of experience · Advanced/Fluent ·Published yesterday · In passive search
SOC Prime Sep 2019 - Now
Threat Research/Detection Engineering/Team Lead
Eurotelecom LLC Jan 2019 - Sep 2019
Cybersecurity Engineer/Analyst
DTEK Dec 2017 - Jan 2019
Cybersecurity Manager
StarlightMedia Jun 2017 - Dec 2017
Information Security Officer
PE Korsun 2014 - 2017
Senior Cybersecurity Analyst/Threat Research
Universalbank 2014
Information Security Officer
Piraeusbank 2008 - 2014
Information Security Officer
$700 / mo
≈ $8400 / year net
Security Analyst
Ukraine · Kyiv · No experience · Upper-Intermediate ·Published 2 May
Ukraine · Kyiv · No experience · Upper-Intermediate ·Published 2 May
Learned to identify website vulnerabilities.
Advanced experience in using Linux and Windows.
Programmed in the following languages: Python, JavaScript, Java, Go.
Experience in using Docker, GitHub, AWS, Google Cloud.
Used AWS and Google Cloud for DDOS attacks on the aggressor's Internet resources as part of the Ukrainian cyber army.
$1000 / mo
≈ $12000 / year net
Penetration Tester
Ukraine · Kyiv · 1 year of experience · Upper-Intermediate ·Published 1 May
Ukraine · Kyiv · 1 year of experience · Upper-Intermediate ·Published 1 May
- eJPTv2 Certified
- Familiar with finding and exploiting most common vulnerabilities: XSS, Sql Injections, IDORs, SSTI, CSRF etc.
- Able to write penetration test reports with remediation suggestions
- Basic knowledge in reverse engineering and binary exploitation
- Hands on experience in validating vulnerabilities and using automated scanners like Tenable Web/Nessus, InsightVM.
- Conducted pilot tests of different cybersecurity solutions like Core Impact, Manage Engine EC
Have a good understanding and experience in a huge amount of cybersecurity tools: nmap, sqlmap, nuclei, different fuzzing tools(wfuzz, ffuf, gobuster etc.), nessus, owasp-zap, burpsuite, wireshark, metasploit and many other
$3500 / mo
≈ $42000 / year net
Security System Administrator
Ukraine · Kyiv · 2 years of experience · Beginner/Elementary ·Published 1 May
Ukraine · Kyiv · 2 years of experience · Beginner/Elementary ·Published 1 May
For 11 months, I successfully held the position of an Information Security Systems Administrator, where my responsibilities included the implementation and support of diverse systems. Through effective teamwork and my ability to quickly respond to challenges, we managed to ensure a reliable level of information protection for the company.
Upon completing the first stage of my career, I assumed the role of a Senior Information Security Systems Administrator, overseeing critical projects and facilitating the proper development of information security infrastructure. Over the course of 8 months in this role, I further strengthened my knowledge and skills.
My experience encompasses a range of contemporary information security systems, including One Identity Safeguard Privileged Access Management (PAM), Palo Alto NGFW, Tufin (Network Security Policy Management), and Picus (Security Validation Platform). I also successfully administered NGFW Checkpoint, Microsoft DLP, Cortex XDR, and piloted CrowdStrike Identity Protection.
My abilities span a wide spectrum of tools and technologies, from Cisco Firepower and Microsoft Defender to Microsoft Identity Manager, ArcSight ESM, Cloudflare, and Active Directory. Through in-depth analysis of IPS policies on Cisco Firepower, my professional insights made a significant contribution to enhancing the company's infrastructure protection.
I remain open to learning and personal development, continuously honing my knowledge and skills to stay at the forefront of the information security field.