• File

Дмитро

SOC Analyst

Age: 21 years
City of residence: Sudova Vyshnia
Ready to work: Lviv
Age:
21 years
City of residence:
Sudova Vyshnia
Ready to work:
Lviv

Contact information

The job seeker has entered a phone number and email.

Name, contacts and photo are only available to registered employers. To access the candidates' personal information, log in as an employer or sign up.

Uploaded file

Quick view version

This resume is posted as a file. The quick view option may be worse than the original resume.

Dmytro Bilinskyi
Cybersecurity Specialist
LinkedIn | GitHub

Details

Location: Ukraine, Lviv
Email: [open contact info](look above in the "contact info" section)
Phone: [open contact info](look above in the "contact info" section)

Profile summary

University-educated and highly driven cybersecurity specialist with a fervent passion for excelling
in SOC operations, policy development, and incident response. Combining strong academic
foundations with hands-on theoretical knowledge, I focus on threat analysis, incident response,
vulnerability management, security governance and system administrations. Proactive and
committed to continuous learning, I transform academic insights into practical defense strategies
and policy frameworks. My career is dedicated to strengthening organizational defenses and
aligning them with international standards such as NIST to ensure robust protection of critical
assets against modern cyber risks.

Education

Bachelor’s Degree in Cybersecurity, Lviv Polytechnic National University, Lviv | Sep 2021 – Jun
2025
UnderDefense Internship, Lviv | Aug 2024 – May 2025

Technical and Soft skills

Security Frameworks: NIST, ISO 27001, CIS, MITRE ATT&CK, Cyber Kill Chain, Pyramid of Pain
OS: Linux, Windows, Active Directory
Network Security and Analysis: Wireshark, tcpdump
SIEM and Log Analysis: Splunk, ELK Stack, Wazuh, Azure Sentinel
EDR: SentinelOne, MS Defender for Endpoints
MDM: Microsoft Intune, Scalefusion
Intrusion Detection/Prevention (IDS/IPS): Snort, Suricata
Vulnerability Assessment: OpenVAS, Nessus
Cloud: AWS (IAM, EC2, S3, VPC, CloudTrail, CloudWatch, Config, GuardDuty), GCP (BQ, Logs, IAM,
Compute Engine, SIEM, GCS, etc.)
Firewalls and Network Access Control: pfSense
Scripting and Rules creation: Python (Mid), Bash (Mid), PowerShell (Mid), RegEx, IDS/IPS
Forensics and Incident Response: Volatility, FTK, Velociraptor
Monitoring: Grafana
Soft Skills: Problem Solving, Self-motivation, Time Management, Teamwork, Fast Learner,
Communication, Adaptability.

Practical Experiences

Security Engineer (Pakurity)| Jul 2025 - Present
● Configuring GCP cloud infrastructure and managing MS Azure
● Remote support for mixed Windows, macOS and Linux endpoints: agent installs,
updates and VPN troubleshooting.
● Triage AV/EDR/SIEM alerts: collect artifacts, analyze logs, identify IOCs and map
findings to MITRE ATT&CK.
● Enforce endpoint security controls (FDE, firewall, MDM policies) and verify
compliance. Prepare and release agent installers (MSI/PKG), run compatibility and
regression tests.
● Administer Microsoft Tools (Intune, Entra, Defender, etc.) and Apple Business
Manager (enrollment, config profiles, remediation).
● Automate tasks with PowerShell and Bash; use MS Graph / REST APIs for
management. Troubleshoot with Sysinternals, tcpdump/Wireshark and gather
diagnostics.
● Manage BCP/DR for related resources
● Implementation of internal compliance

Self-learned Security Analyst & Internship at UnderDefense | Oct 2023 – Jul 2025
● Independently designed and maintained a home lab to acquire hands-on cybersecurity
expertise. Built a comprehensive home infrastructure integrating SIEM platforms (Splunk,
ELK, Wazuh) for log collection and analysis across both Windows and Linux systems.
● Enhanced monitoring capabilities by incorporating additional logging solutions such as
IDS/IPS and monitoring in Wireshark. Leveraged various blue team tools and utilities to
streamline incident response processes and reinforce overall security.
● Conducted threat hunting exercises utilizing the MITRE ATT&CK framework to continuously
analyze and understand potential adversarial behaviors.
● Detected Indicators of Compromise (IOCs) using tools like YARA, enabling proactive threat
identification. Employed analytical thinking to decipher attacker methodologies.
Security Governance & Compliance:
● Performed policy applicability and gap analysis in lab environments using simulated
compliance checklists.
● Practiced monitoring enforcement of policies through SIEM tools and alert generation
(Wazuh, ELK, Splunk).
● Worked collaboratively with a simulated IT team to implement security policies within
Active Directory, including Group Policy Objects (GPOs) for access control, account lockout
policies, and user privileges.
● Understanding of GDPR principles and their application to internal security policies.

Motivation

I am deeply passionate about cybersecurity and dedicate several hours each day to hands-on labs,
simulations, and real-world challenges to strengthen my technical expertise. While still expanding
my professional experience, I stay focused on practical, high-impact areas such as endpoint
security, compliance, threat detection, security engineering and SOC analysis. I am eager to
contribute to a security-driven team, enhance organizational resilience through effective controls
and policies, and continue growing into a trusted cybersecurity specialist.

More resumes of this candidate

Similar candidates

All similar candidates


Compare your requirements and salary with other companies' jobs: