Personal Information
Organization / Workplace
Ukraine Ukraine
Occupation
CyberSecurity Professional
About
Ph.D. OWASP Chapter Leader. Security Researcher, Team lead for bright and smart geeks.
Specialties: BizDev, R&D, AppSec, Cloud, Pentesting Automation, Linux, Networking, Windows Server, Virtualization, Forensics, Reverse Engineering, Malware analysis, OWASP, SIEM, Splunk
Security Certifications: Certified Ethical Hacker (EC-Council), , AWS Certified SysOps, HP Fortify Security Technical Specialist, CIW Web Security Specialist, Cisco SMB Security Specialist, Zyxel Security Specialist
IT Certifications:CLE,DCTS,DCATS,NAI,CLP,NLTS,CNA,NCLA,MCTS
Tags
security
hacking
security hole
penetration testing
sdlc
owasp
unusual security vulnerabilities
softserve
cyber security
splunk
breach
business
product
risks
code
automotive
agile
process
injection
sql
authentication
owasp lviv
competitive intelligence
See more
Presentations
(13)Likes
(4)Fuzzing underestimated method of finding hidden bugs
Pawel Rzepa
•
7 years ago
AWS security monitoring and compliance validation from Adobe.
Splunk
•
7 years ago
PowerPoint Hacks for Rookies: 4 Must Consider Aspects
24Slides
•
8 years ago
Проект реабілітації військових в ІТ
Nazar Tymoshyk, CEH, Ph.D.
•
9 years ago
Personal Information
Organization / Workplace
Ukraine Ukraine
Occupation
CyberSecurity Professional
About
Ph.D. OWASP Chapter Leader. Security Researcher, Team lead for bright and smart geeks.
Specialties: BizDev, R&D, AppSec, Cloud, Pentesting Automation, Linux, Networking, Windows Server, Virtualization, Forensics, Reverse Engineering, Malware analysis, OWASP, SIEM, Splunk
Security Certifications: Certified Ethical Hacker (EC-Council), , AWS Certified SysOps, HP Fortify Security Technical Specialist, CIW Web Security Specialist, Cisco SMB Security Specialist, Zyxel Security Specialist
IT Certifications:CLE,DCTS,DCATS,NAI,CLP,NLTS,CNA,NCLA,MCTS
Tags
security
hacking
security hole
penetration testing
sdlc
owasp
unusual security vulnerabilities
softserve
cyber security
splunk
breach
business
product
risks
code
automotive
agile
process
injection
sql
authentication
owasp lviv
competitive intelligence
See more