Resume from January 29, 2019

Personal information hidden

This job seeker decided to hide his personal information and contact info, but you can send a message to him or suggest a job to him.

This job seeker has chosen to hide his personal information and contact info. You can contact him using this page: https://www.work.ua/resumes/3231961

Information Security, Cybersecurity Consultant, Penetration Tester

Employment:
Full-time, part-time.
City of residence:
Kyiv
Ready to work:
Kyiv, Remote

Contact information

This job seeker has hidden his personal information, but you can send him a message or suggest a job to him if you open his contact info.

Name, contacts and photo are only available to registered employers. To access the candidates' personal information, log in as an employer or sign up.

Work experience

Information and cybersecurity consultant, Penetration tester

from 02.2012 to now (12 years 3 months)
Information security

Provided security risk audit, penetration testing, vulnerability assessment and threat modelling, websites and web-application security testing. Taught staff cybersecurity guidelines. Consulting a political party headquarters during the parliamentary election campaign on building up comprehensive information security structure for providing defenсe on three security level– physical, human, logical. Took part in private investigations of cyber incidents. Gave a plethora of consultations on information security issues to private, business, government and military persons. Provided information and reputation protection for clientele. Teaching staff technical and psychological defence from social engineering. Consulting public figures on personal cybersecurity issues and securing their personal gadgets and office networks. Recovering computers and information after cyberattacks. Took part in elaborating and implementing of security policy.

Education

Kiev National University

Journalism, Киев
Higher, from 1985 to 1992 (6 years 9 months)

Additional education and certificates

"IT-security and ethical hacking”

LearnSmart LLC course, 2014

"Security of websites and personal correspondence”

Digital Security School Ukraine), co-project of eQualit.ie (Montreal, Canada) and “Internews Ukraine” , 2015

“Practical cybersecurity” by Malcolm Shore

2014

“Information security concepts & secure design principles" by Hack2secure

2015

•“Essentials of Cryptography and Network Security” by prof. Lisa Bock

2015

“Cybersecurity and its ten domain” by Kennesaw State University

2014

“Java Start” by kiev.prog.ua

2015

"Foundation of cybersecurity” by Malcolm Shore

2014

•“Foundation of IT-security—Operating system security” by prof. Lisa Bock

2015

“Computer security –Investigation and response” by Sandra Toner

2015

"Risk identification, monitoring and analysis" (Pluralsight-- SSCP)

2016

«Protect your network with open-source software» by Pluralsight

2015

«Threats and vulnarabilities» by Pluralsight

2015

“Web Security and the OWASP Top 10: The Big Picture” by Troy Hunt

2016

“The Complete Cyber Security Course: Network Security!” by StationX

2016

Knowledge and skills

Операционные системы Программирование

Language proficiencies

  • English — advanced
  • Russian — fluent
  • Ukrainian — fluent

Additional information

High-qualified information and cybersecurity specialist with strong security mindset and excellent skills.

Wide in-depth knowledge on modern cyberthreats, cyberattacks and appropriate countermeasures
Penetration testing
Ethical hacking
Security assessment
Network and end-point security
Web sites and web-apps (OWASP) security testing
Risk audit and vulnerability assessment
Threat modelling
Network forensic
Open-source intelligence (OSINT) methods and tools
Elaborating of comprehensive security infrastructure
Teaching the staff IT–security rules and skills
Training the staff for resilience to social engineering attacks

Tech skills

Platforms: Windows (7, 8, 10), Linux (Kali, Ubuntu)
Network: LAN/WLAN, TCP/IP, defence, traffic analysing
Languages: Python, Java(basic)
The variety of security and penetration testing tools like OwaspZap, BurpeSuite, Metasploit, Maltego, Nmap etc.

Similar candidates

All similar candidates


Compare your requirements and salary with other companies' jobs: