• Файл

Дмитро

Системний адміністратор

Вік: 21 рік
Місто: Судова Вишня
Вік:
21 рік
Місто:
Судова Вишня

Контактна інформація

Шукач вказав телефон та ел. пошту.

Прізвище, контакти та світлина доступні тільки для зареєстрованих роботодавців. Щоб отримати доступ до особистих даних кандидатів, увійдіть як роботодавець або зареєструйтеся.

Завантажений файл

Версія для швидкого перегляду

Це резюме розміщено у вигляді файлу. Ця версія для швидкого перегляду може бути гіршою за оригінал резюме.

Dmytro Bilinskyi
Cybersecurity Specialist
LinkedIn | GitHub

Details

Location: Ukraine, Lviv
Email: [відкрити контакти](див. вище в блоці «контактна інформація»)
Phone: [відкрити контакти](див. вище в блоці «контактна інформація»)

Profile summary

University-educated and highly driven cybersecurity specialist with a fervent passion for excelling in
SOC operations, policy development, and incident response. Combining strong academic
foundations with hands-on theoretical knowledge, I focus on threat analysis, incident response,
vulnerability management, and security governance. Proactive and committed to continuous
learning, I transform academic insights into practical defense strategies and policy frameworks. My
career is dedicated to strengthening organizational defenses and aligning them with international
standards such as ISO 27001, NIST to ensure robust protection of critical assets against modern
cyber risks.

Education

Bachelor’s Degree in Cybersecurity, Lviv Polytechnic National University, Lviv | Sep 2021 – Jun 2025
UnderDefense Internship, Lviv | Aug 2024 – Apr 2025

Technical and Soft skills

Security Frameworks: NIST, ISO 27001, CIS, MITRE ATT&CK, Cyber Kill Chain, Pyramid of Pain
OS: Linux, Windows, Active Directory
Network Security and Analysis: Wireshark, tcpdump
SIEM and Log Analysis: Splunk, ELK Stack, Wazuh
Intrusion Detection/Prevention (IDS/IPS): Snort, Suricata
Vulnerability Assessment: OpenVAS, Nessus
Cloud: AWS
Firewalls and Network Access Control: pfSense
Scripting and Rules creation: Python (Mid), Bash (Mid), PowerShell (Low), RegEx, IDS/IPS
Forensics and Incident Response: Volatility, FTK, Velociraptor
Compliance and Policy: Security policy writing,
Soft Skills: Problem Solving, Self-motivation, Time Management, Teamwork, Fast Learner,
Communication, Adaptability.

Practical Experiences

Self-learned Security Analyst | Oct 2023 – Present
 Independently designed and maintained a home lab to acquire hands-on cybersecurity
expertise. Built a comprehensive home infrastructure integrating SIEM platforms (Splunk,
ELK, Wazuh) for log collection and analysis across both Windows and Linux systems.
 Enhanced monitoring capabilities by incorporating additional logging solutions such as
IDS/IPS and monitoring in Wireshark. Leveraged various blue team tools and utilities to
streamline incident response processes and reinforce overall security.
 Conducted threat hunting exercises utilizing the MITRE ATT&CK framework to continuously
analyze and understand potential adversarial behaviors.
 Detected Indicators of Compromise (IOCs) using tools like YARA, enabling proactive threat
identification. Employed analytical thinking to decipher attacker methodologies.

Security Governance & Compliance:
 Performed policy applicability and gap analysis in lab environments using simulated
compliance checklists.
 Practiced monitoring enforcement of policies through SIEM tools and alert generation
(Wazuh, ELK, Splunk).
 Worked collaboratively with a simulated IT team to implement security policies within Active
Directory, including Group Policy Objects (GPOs) for access control, account lockout policies,
and user privileges.
 Understanding of GDPR principles and their application to internal security policies.

Motivation

I am passionate about cybersecurity and invest a few hours every day in hands-on labs and
challenges to sharpen my skills. While I am still building my industry experience, I proactively focus
on areas of high organizational impact. I am eager to contribute to a security-focused team, help
improve internal defenses through well-crafted policies, and grow into a trusted security advisor.

Інші резюме цього кандидата


Порівняйте свої вимоги та зарплату з вакансіями інших підприємств: