Pavel S.

Pavel S.

9+ years of combined Cyber Security, software development and overall industry experience.

Chicago , United States

Experience: 6 Years

Pavel

Chicago , United States

9+ years of combined Cyber Security, software development and overall industry experience.

120000 USD / Year

  • Immediate: Available

6 Years

Now you can Instantly Chat with Pavel!

About Me

 9+ years of combined Cyber Security, Software Development and DevOps experience.
 Professional understanding of cyber security concepts, standards and guidelines including Malware Reverse Engineering
Analysis/Detection Engineering, ...

Show More

Portfolio Projects

Description

Worked on code review of internal applications run-time security flaws such as SSRF and mitigation of git secret information storage. Developed shell and python based applications for SEDATED/Truffle Hog code review process. Released customized SEDATED and Truffle Hog application. Updated security critical features of an internal application with developers on thousands of git repositories. Used git/Jenkins API’s in Python to assist with large tasks.

Show More Show Less

Description

Worked on penetration testing of code logic in internal applications. Developed C#-based secure password generator for DevSecOps team to secure service IDs and system accounts. Updated security critical features of an internal application. Created an encryption utility for Web.Config system configuration files for DevOps team. Created an encryption utility for Web.Config system configuration files for DevOps team. Created Web-services and API’s in Python.

Show More Show Less

Description

Developed class objects for a python based trading news ticker application, which was based on a bridge/filter and some singleton designs patterns. The bridging classes where to give application API calls with XML, JSON, PLINK-ssh api, and SNMP. Development was conducted on Windows 7/ Server 2008, RHEL Linux with Atom, Eclipse, Netbeans; Used Apache to deploy production site. Worked with stakeholders to negotiate requirements for data transfer and storage requirements.

Show More Show Less