Publikuj oferty pracy
Zatrudniaj bez prowizji
Ponad 6-letni doświadczony tester penetracyjny i inżynier bezpieczeństwa.
Umiejętności DevOps i SecDevOps z orientacją na bezpieczeństwo.
Zaawansowana wiedza z zakresu administracji Linuksem, administrowania serwerami WWW, stosu LAMP, technik i metodologii testów penetracyjnych.
Biegłe posługiwanie się skanerami podatności, skanerami Linux i Windows, narzędziami do monitorowania ruchu sieciowego. Dobra znajomość usług chmurowych, takich jak AWS i Azure, umiejętność elastycznego stosu.
Doświadczony w testowaniu bezpieczeństwa technologii związanych z kryptowalutami: blockchain, smart kontrakty, tokeny, mosty.
Stosuj logiczne i metodyczne podejście do realizacji zadań i celów; potrafi budować i wdrażać wyrafinowane plany; zdeterminowany i zdecydowany; wykorzystuj inicjatywę, aby stawiać czoła wyzwaniom i rozwiązywać je.
Język ojczysty – ukraiński.
Biegły rosyjski, biegły angielski.
Języki programowania/Technologie
§ Pythona
§ Bash
§ Php
§ Javascript
§ JavaEE
§ Rubin
§ C
§C++
§ Badania i rozwój SaaS/SOA/RIA
§ SIEM
§ Dokumentacja techniczna/Raporty z testów penetracyjnych/Propozycje
RDBMS
§ Mój SQL
§ PostgreSQL
§ SQLite
Metodologie
§ OWASP
§ NIST
System operacyjny
§ Microsoft Windows 95/ 98/ 2000/ XP/ 2003 Server/ Vista / 7/8/10
§ Kali Linux
§ Ubuntu
§ CentOS
Środowiska wirtualizacyjne
§ VMWare
§ VirtualBox
§ OpenStack
Sprzęt komputerowy
§ Technologie sieciowe
§ Inne urządzenie technologiczne
Serwery aplikacji/internetowe
§ Nginx
§ Php-fpm
§ Tomcat
§ IIS
§ Apache
§ Redis
§ Active Directory
§ DNSy
§ DHCP
§ SNMP
§ MŚP
Narzędzia programistyczne
§ Ansible (podstawowy)
§ AWS/Kubernetes
§ Azure
§ Doker
§ Jenkinsa
§ GitLab
§ Git
§ CI/CD
§ Otwarta zmiana
Narzędzia do testowania
§ Nmapa
§ Nikto
§ Zestaw beknięcia
§ OWASP ZAP
§ Nessus
§ Wiresharka
§ Maltego
§ Mapa sql
§ Pogromca
§ Metasploit
§ Rozbłysk chmur
Inne technologie
§ Łańcuch bloków
§ Inteligentne kontrakty
§ Mosty dla kryptowalut
Administration of the website on AWS Kubernetes, which uses nginx, php-fpm, mysql. Control of resources in use and it’s optimization. Azure deployment
- testing security of the website
- optimizing mysql
- configuring dns records for main domain and subdomains
- controlling memory flows
- configuring
4 team members
Nginx, php-fpm, mysql, redis, DNS, Kubernetes, Jenkins, Zabbix
During a penetration test of cryptocurrency website, a critical vulnerability was found. This vulnerability allowed to get all confidential information about the users, including emails, wallets and balances, etc. knowing user ID. The vulnerability was amplified with the fact that it was easy to generate all possible IDs with own written script. Our team helped to fix this vulnerability as soon as it was found.
- analyze the system and prepare scope of work
- gather information about the system
- check used services and their versions
- find exploits for these services
- test api and requests to the server
- get access to the database
- prepare a detailed report on found vulnerabilities including executive summary, risk level of each vulnerability and recommendations on how to fix them.
Curl, Burp Suite, Requests interception, modification, injections of malicious code, own written bash script to brute force user ID values.
An enterprise company requested DDoS protection and full security audit of the website on AWS managed with Kubernetes. At the time of DDoS attacks Kubernetes scaled used resources up to 8 servers. However, even this scaling did not help agains the attacks. So our team has configured proper security rules, managed WAF and firewall and has written own solution. After this complex approach any attack could not harm the system.
- external threat modeling
- information gathering
- testing AWS security groups
- identity and access management
- test data protection
- internal threat modeling
- web app code review
- communication with client's security engineer
- generating a report with executive summary, risk level of each vulnerability and recommendations on how to fix them
AWS, Kubernetes, Openshift, Cloudflare, WAF, firewall, own solution written in php.
A website of an e-commerce company.
- external threat modeling
- information gathering
- analyzing logs
- performance monitoring
- testing production environments
- identity and access management
- test data protection
internal threat modeling
- communication with client's security engineer
- generating a report with executive summary, risk level of each vulnerability and recommendations on how to fix them
Cloudflare, WAF, firewall, own solution written in php, Zabbix, Burp Suite.
An internal network of a software development company.
- analyzing internal network traffic
- security testing of devices in the network
- analyzing logs
- performance monitoring
- testing production environments
- test data protection
communication with client's security engineer
generating a report with executive summary, risk level of each vulnerability and recommendations on how to fix them
WAF, firewall, Zabbix, Burp Suite, Nmap, Wireshark.
A website of an e-commerce company.
- recovery of the website after an attack
- analyzing logs
- performance monitoring
- automation of the main system processes
- handling system errors
- testing production environments
- identity and access management
- test data protection
- communication with client's security engineer
- generating a report with executive summary, risk level of each vulnerability and recommendations on how to fix them
Firewall, Zabbix, Burp Suite, Nmap.