Размещайте вакансии
Нанимайте без комиссий
Более 4 лет опыта работы тестером на проникновение, инженером по безопасности и DevOps в области безопасности. Продвинутые знания методов и методологий тестирования на проникновение. Профессиональные навыки SecDevOps. Навыки АВС.
Свободное использование сканеров уязвимостей, сканеров Linux и Windows, инструментов мониторинга сетевого трафика, защиты веб-серверов и мобильных приложений.
Использовать логический и методический подход к достижению задач и целей; способен строить и реализовывать сложные планы; решительный и решительный; проявлять инициативу, чтобы встречать и решать проблемы.
Родной язык – украинский.
Свободный русский, свободный английский.
Языки программирования/технологии
§ Питон
§ Баш
§ Php
§ Javascript
§ HTML
§ Рубин
§ С\С++
§ СИЭМ
§ Техническая документация/Отчеты о тестировании на проникновение/Предложения
§ Обратный инжиниринг
СУБД
§ Мой SQL
§ ПостгресSQL
§ SQLite
Инструменты разработки
§ Доступный (базовый)
§ AWS/Кубернет
§ Докер
§ Дженкинс
§ Гитлаб
§ Гит
§ CI/CD
Среды виртуализации
§ VMWare
§ Виртуальная коробка
Операционные системы
§ Microsoft Windows 95/98/2000/XP/2003 Server/Vista/7/8/10
§ Кали Линукс
§ Убунту
§ ЦенОС
Приложения/веб-серверы
§ Нгинкс
§ Php-fpm
§ Кот
§ ИИС
§ Апачи
§ Редис
§ Активный каталог
§ DNS
§ DHCP
§ SNMP
§ малый и средний бизнес
Методологии
§ ОВАСП
§ НИСТ
§ ИСАКА
Инструменты тестирования
§ Nкарта
§ Никто
§ Берп Люкс
§ ОВАСП ЗАП
§ Несс
§ Wireshark
§ Мальтего
§ SQL-карта
§ Гобастер
§ Метасплойт
§ Облачная вспышка
§ Скользить
Аппаратное обеспечение
§ Сетевые технологии
§ Различное технологическое устройство
Mobile application for IOS and Android - a wallet for cryptocurrency, which is used for transactions between different currencies
§ Analyze the system and prepare scope of work
§ Reverse Engineering of Android app
§ Testing security of the apps
§ Dynamic and Static testing
§ Test api and requests to the server
§ Prepare a detailed report on found vulnerabilities including executive summary, risk level of each vulnerability and recommendations on how to fix them.
Industry-standard penetration testing tools and frameworks, including Nmap, Sniper, Nessus, Maltego, Hydra, the Metasploit Framework, Searchsploit, Dirb, Gobuster, Wireshark, Burp Suite, Tcpdump and Sqlmap
An enterprise company requested DDoS protection and full security audit of the website on AWS managed with Kubernetes. At the time of DDoS attacks Kubernetes scaled used resources up to 8 servers. However, even this scaling did not help agains the attacks. So our team has configured proper security rules, managed WAF and firewall and has written own solution. After this complex approach any attack could not harm the system.
§ external threat modeling
§ information gathering
§ testing AWS security groups
§ identity and access management
§ test data protection
§ internal threat modeling
§ web app code review
§ communication with client's security engineer
§ generating a report with executive summary, risk level of each vulnerability and recommendations on how to fix them.
The client with the bank system requested to perform a penetration testing against his system. The test scope for this engagement included a businesscritical web application on AWS cloud web hosting, company's internal network, as well as a company's Security Information and Event Management (SIEM) system.
Identify areas where improvement is needed in security education and awareness for users
Industry-standard penetration testing tools and frameworks, including Nmap, Sniper, Nessus, Maltego, Hydra, the Metasploit Framework, Searchsploit, Dirb, Gobuster, Wireshark, Burp Suite, Tcpdump and Sqlmap. AWS infrastructure deployment.
During a penetration test of cryptocurrency website, a critical vulnerability was found. This vulnerability allowed to get all confidential information about the users, including emails, wallets and balances, etc. knowing user ID. The vulnerability was amplified with the fact that it was easy to generate all possible IDs with own written script. Our team helped to fix this vulnerability as soon as it was found.
§ analyze the system and prepare scope of work
§ gather information about the system
§ check used services and their versions
§ find exploits for these services
§ test api and requests to the server
§ get access to the database
prepare a detailed report on found vulnerabilities including executive summary, risk level of each vulnerability and recommendations on how to fix them.
Curl, Burp Suite, Requests interception, modification, injections of malicious code, own written bash script to brute force user ID values.
A website of an e-commerce company.
§ external threat modeling
§ information gathering
§ analyzing logs
§ performance monitoring
§ testing production environments
§ identity and access management
§ test data protection
§ internal threat modeling
§ communication with client's security engineer
generating a report with executive summary, risk level of each vulnerability and recommendations on how to fix them
Cloudflare, WAF, firewall, own solution written in php, Zabbix, Burp Suite.
An internal network of a software development company
Responsibilities:
§ analyzing internal network traffic
§ security testing of devices in the network
§ analyzing logs
§ performance monitoring
§ testing production environments
§ test data protection
§ communication with client's security engineer
§ generating a report with executive summary, risk level of each vulnerability and recommendations on how to fix them
Tools & Technologies:
WAF, firewall, Zabbix, Burp Suite, Nmap, Wireshark.
Responsibilities:
· Research and analyze data from internal and 3rd-party sources to find new ways to expand our security value, validate and optimize newly created security content to improve product precision
· Triage and analyze vulnerability data as well as additional metadata to verify and determine the severity and potential exploitability of vulnerabilities in various runtime environments
· Set high-quality standards, ensuring the accuracy, and the reliability of our proprietary database.
· Use statistical tools to interpret data sets, paying particular attention to trends and patterns that could be valuable for diagnostic and predictive analytics efforts.
· Build and improve the security logic products.
Tools & Technologies:
WAF, firewall, SQL, NoSQL, AWS, Nmap, Sniper, Nessus, Maltego