• File

Владислав

Cyber security specialist

City of residence: Kyiv
Ready to work: Kyiv, Lviv, Remote
City of residence:
Kyiv
Ready to work:
Kyiv, Lviv, Remote

Contact information

The job seeker has entered a phone number .

Name, contacts and photo are only available to registered employers. To access the candidates' personal information, log in as an employer or sign up.

Uploaded file

Quick view version

This resume is posted as a file. The quick view option may be worse than the original resume.

MY CONTACT VLAD ZOLOTAREV
Phone
SOC ANALYST
[open contact info](look above in the "contact info" section)

Email
[open contact info](look above in the "contact info" section) ABOUT MYSELF
Address SOC Analyst with a comprehensive amount of technical skills
Lviv, Kyiv which are used on a daily basis.
Quick learner, problem identifier and troubleshooter

EXPERTISE EXPERIENCE
Linux Cyber Security Consulting Bootcamp (01.01.2022 -06.03.2022 )
Windows Working with a team on some real cases in Cyber Security Consulting. The

Network primary focus was on risk analysis, with detailed work on standards such
as the ISO 27000 series and NIST.
Virtualization
Cyberoo (04.09.2023 - now)
Basic of Python
As a SOC analyst, I specialized in threat detection, incident response, and
OWASP Top 10
security monitoring using SIEM (Elastic Stack) and SOAR (Google Chronicle)
Elastic Stack tools. My responsibilities included analyzing logs for any suspicious activity

Threat detection and verifying it. I also use Google Chronicle SOAR, participated in the
development of detection rules in Elastic Stack, and conducted OSINT
investigations. I often dealt with network traffic analysis using Wireshark. I
performed basic malware analysis.

REFERENCES EDUCATION
TryHackMe 2021-2025 Taras Shevchenko National University of Kyiv
Specialty : Cyber security
https://tryhackme.com/p/vl
adzolotarev280

Certifications
eJPTv2 (Junior Penetration Tester) | eLearnSecurity | ID: 130733315 | 2025
Familiar with OWASP Top 10, including practical understanding of:
Injection attacks (SQLi, XSS), broken access control, security misconfigurations.
Principles of reconnaissance, exploitation, and post-exploitation phases.
Basic network pentesting (Nmap, Burp Suite, Metasploit).

Similar candidates

All similar candidates


Compare your requirements and salary with other companies' jobs: