Команда IT профессионалов
Cyber Security - Consulting - Threat Intelligence
Отслеживание угроз – одна из важнейших процедур, обеспечивающих эффективную защиту бизнеса. TI – это сервис, позволяющий узнавать об угрозах, атаках и уязвимостях нулевого дня до того, как они смогут вам навредить. В случаях, если инцидент все же произошел, TI позволит быстро отреагировать, произвести анализ и расследование инцидента.
Решение Next Generation Firewall объединяет в себе разнообразные по функционалу модули, предназначенные для защиты от сетевых вторжений, что позволяет избежать дополнительных расходов на оборудование. Поддерживается интеграция с существующими инфраструктурными решениями и системами информационной безопасности. Производетельность решения выше, чем у других современных платформ, весь функционал можно использовать без потери скорости обработки данных. Усовершенствованная система мониторинга трафика блокирует до 99,4% сетевых угроз и обеспечивает гибкость системы безопасности, позволяя настроить политики безопасности в соответствии с требованиями регуляторов и внутренними регламентами
Анализ вирусов
При обнаружении неизвестного вируса или при подозрении на вирусное заражение передайте нам зараженный файл. Вирус будет исследован в нашей лаборатории, в изолированной среде. Мы выясним механизм работы и цели вируса, способы противодействия и нейтрализации. По завершении анализа предоставляется отчет содержащий всю собранную нами информацию о вирусе и рекомендации по ликвидации заражения.
Расследование вирусного заражения
При выявлении вирусного заражения или подозрении в заражении наш специалист проведет расследование, чтобы найти программную, аппаратную, сетевую или другую уязвимость, с помощью которой вирус проник в инфраструктуру. По завершении анализа предоставляется отчет содержащий всю собранную в процессе расследования информацию о точке, времени и способе проникновения вируса в инфраструктуру, а также рекомендации по модификации системы безопасности.
Мы предлагаем детальное обследование инфраструктуры компании, по результатам которого вы получите подробный отчет о текущем состоянии и уязвимостях системы информационной безопасности, оценку рисков, а также рекомендации по повышению эффективности функционирования системы, рационализации и сокращению затрат на ИТ-сферу.
Витруализация - это комплекс технологий для обеспечения удаленной работы. Пользователи получают полностью готовое к работе стандартизированное виртуальное рабочее место, доступ к которому осуществляется через локальную сеть или Интернет, а в качестве терминала может использоваться ПК, ноутбук или смартфон. Устройство доступа используется в качестве тонкого клиента, требования к нему минимальны - это удешевляет работу.
Аналитическое устройство предоставляется вам в аренду сроком до двух недель. В течение этого периода устройство собирает данные о событиях и инцидентах в инфраструктуре, которые анализируются как нашими специалистами, так и SIEM системой. После проведения анализа собранных данных, предоставляется отчет о найденных уязвимостях и вирусной активности, а также даются рекомендации по улучшению системы информационной безопасности в виде списка необходимых мер.
Svetlana Pershova
+375-29-641-92-98
Minsk Belarus
Pesonal qualities
- High level of self-organization, find effective ways to perform tasks.
- Responsibility and rationality, accuracy in work
- High learning ability, ability to work in stressful situations
Languages
Russian - native
English – B1/B2
Experience
LBR 2020-…
Project Manager
MINSK, BELARUS
- Projects Delivery;
- Work with Development Team (including Designers, Developers, QA Engineers);
- Timely Informing about Delivery Date Changes, Issues, Solution;
- Maintaining Accurate Information about the Project Status Daily Basis;
- Project Status Report
- Create and Maintain Documentation
- Determine the Monetisation Strategy
V-Office LLP 06.2018-06.2019
Project Manager
ALMATY, KAZAKHSTAN
- Building the Relationship with the Customers (Calls, Presentations, Negotiations, Email, Exhibitions) etc.
- Work with Development Team (including Designers, Developers, QA Engineers);
- Pulling and Pushing Developers Team
- Preparation of a Commercial Proposal
- Contract Negotiation and Establishing Service Agreements with Customers
- Maintaining Accurate Information about the Project Status Daily Basis.
- Timely Informing about Delivery Date Changes, Issues, Solution
- Project Status Report
OrientSwiss Kazakhstan LLP 07.2017 - 04.2018
Sales manager
ALMATY, KAZAKHSTAN
- Collect and Manage Project Team
- Maintaining Accurate Information about the Project Status Daily Basis.
- Timely Informing about Delivery Date Changes, Issues, Solution Evaluate and Assess Result of Project Preparation and Participation in the Road Show in Kazakhstan for Customers
- Building the Relationship with the Customers (Calls, Presentations, Negotiations, Email, Exhibitions) etc.
- Preparation of a Commercial Proposal
- Sales Management and Reporting to Director
PCD Trade LLP 2014 - 2017
Project manager
ALMATY, KAZAKHSTAN
- Sells Services and Goods to Customers Supplier Price
- Negotiations with Suppliers about Good Prices and Delivery Conditions for Customers
- Control Preparation of a Presentation for the Customer Preparation of a Commercial Proposal
- Contract Negotiation and Establishing Agreements With customers
- Tracking Delivery of Goods to the Customer’s Warehouse
Atol LLP 2008 - 2014
Project Manager
ALMATY, KAZAKHSTAN
- Sells Services and Goods to Customers Supplier / Price Analysis
- Negotiations with Suppliers about Good Prices and Delivery Conditions for Customers
- Preparation of a Presentation for the Customer Preparation of a Commercial Proposal
- Contract Negotiation and Establishing Agreements With customers
- Tracking Delivery of Goods to the Customer’s Warehouse/ Customer Payment Control
Education/Certification
FacultyEconomics 2004 - 2007 Central Asian University,
Courses Accounting “Accounting Central House” 2008: - 1C: Accounting 7.7 - Statistical data forms - Electronic tax forms
English courses 2017
Dr WEB, Certified user of Dr WEB Anti-Virus for Business 2018
Specialized courses ALISON https://alison.com Fundamentals of Operations Management 2019
Specialized courses ALISON https://alison.com Project Management - Quality, Risk, Procurement and Project Closeout 2019
Specialized courses ALISON https://alison.com Project Management Basics: Project Management / Project Life Cycle 2019
Additional skills
- Strong knowlege in Microsoft (Word, Excel, Power Point, Outlook etc.)
- CRM, ERP, ECM User (1C, Odoo, Bitrix, Motiv);
- Strong knowlege in SCRUM, AGILE, Waterfall, PMBoK etc.
- Driver’s license (cat. B)
Ivan Kutov
linkedin | Almaty, Kazakhstan |
I work in IT field, since 2004 and have rich experience in:
- Enterprise infrastructure setting up and support, including various network and server equipment.
- Developing information security strategy, processes, policies, tender document technical specifications, manuals.
- Conducting different security products pilots.
Experience
V-office LLP (Kazakhstan), Information Security Advisor May 2017 – Present
Systems integrator company responsibilities:
- Information security audit and/or Penetration testing
- Company and customers processes optimization/development
- Information security Training for internal stuff (skills improvement, cyber security awareness)
- Customer infrastructure optimization
- Pilot project implementation with further deployment into production
- Securing business processes
- Cloud and network administration
SOC (security operation center) as a service for telecom/service provider company:
- ISMS administration and control
- Incident response
- Forensics
- Vulnerability management
** Corporate Business Systems (Kazakhstan), Information Security Advisor\Engineer**
June 2019 – Present
Work with information security vendors:
Check Point, PaloAlto, Fortigate, Cisco, IBM, McAfee, Symantec, Positive Technologies, Fudo PAM, Wallix, CyberArk, Microsoft.
- Infrastructure Audit.
- Information security audit
- Threat Inteligence analysis.
- Securing business processes
- Development of Information Security strategy.
- Development of regulatory documents
Life 2 Win LLP (Almaty), Information Security Engineer May 2017 – Nov 2017 7 months
Work with information security vendors: Check Point, PaloAlto, Kaspersky KATA, McAfee, Symantec DLP. Fortigate, Positive Technologies
- Infrastructure Audit.
- Information security audit and/or Penetration testing
- Development of Information Security strategy.
- Threat Inteligence analysis.
- Securing business processes
Softline LLP (Almaty), Information Security Engineer Oct 2015 – Apr 2017 1 year 7 months
Work with information security vendors: McAfee, Balabit SCB, PaloAlto, Dell, Trustwave, PT, Fotrigate, Symantec, Splunk, FireEye.
- Pilot project implementation with further deployment into production
- Company and customers processes optimization/development;
- Information security Training for internal stuff (skills improvement, cyber security awareness);
NURBANK (Almaty), Senior Information Security Engineer Jul 2014 – Oct 2015 1 year 4 months
- Implementation and support of Email gateway, Web gateway control systems
- Implementation of SIEM, IDS, Change Control systems
- Management of DLP, Cisco CSA,
- Identifying vulnerabilities, checking for possible hacking systems.
- Administration of Windows and Linux servers.
- PCI DSS Compliance
IRIS Enterprise Services LLP (Almaty), Outstaff Engineer Jul 2013 – Jul 2014 1 year 1 months
- Administration Windows servers 2008r2, 2012R2 (AD, DHCP, DNS, Mail, Proxy, 1C, terminal servers, Hyper-V)
- Work with Linux systems (Ubuntu, Debian, Centos)
- Configuring network systems (NAT, VPN, Routing, Firewall)
- Project managment.
- Helpdesk.
MS-Service (Almaty), Outsourcing Engineer Jan 2009 – May 2013 4 years 5 months
- Support Windows servers (AD, DHCP, DNS, Mail, Proxy, 1C, Vmware ESXI)
- Work with Linux systems (Ubuntu, Mandriva)
- Work with SAP, Cognos, VPN, Citrix XenDesktop, Cisco systems.
- Helpdesk.
Indoor Television LLP (Almaty), Software Specialist, video engineer Sep 2007 – Jun 2008 10 months
- Development and processing of promotional movies
- Development and support of software
- Assembly of computers, software installation
Alser computers LLP (Almaty), Computer assembly, tester Jul 2004 – May 2005 11 months
- Assembly of computers
- Install and configure software
- Testing and maintenance hardware and software
Core Competence
Network device vendors: Fortigate, Palo Alto Networks, Check Point, Cisco, Vmware NSX, Juniper SRX*, Opensource products
Virtual platforms: VMWare, VCloud director, Citrix XenServer, Citrix XenApp, KVM, Vagrant.
Operation systems: FreeBSD, Debian, CentOS, Ubuntu, Microsoft Windows Servers
Security:
SIEM – McAfee, Splunk, IBM Qradar, Arcsight, PT.
Mail gateway - McAfee, Kaspersky, Cisco.
Web gateway - McAfee, Forcepoint, Kaspersky, Paloalto, Fortigate, Cisco.
Endpoint - McAfee, Kaspersky, Checkpoint, Trendmicro.
WAF – Trustwave, PositiveTechnology, F5, Imperva.
DLP – McAfee, Symantec, Infowatch, Garda, Websense, Devicelock, GTB, IP guard.
PAM - Balabit SCB, CyberArk, Fudo, Wallix.
ATD – McAfee, Kaspersky, Checkpoint, FireEye.
Nac - ForeScout.
ICS - CyberX.
Backup – Symantec, Veritas, Dell, Comvault.
Kali tools.
Education
Turan University, Almaty, Kazakhstan.
Bachelor, Computing Equipment and Automated Systems
Dates attended or expected graduation 2008 – 2011
Central-Asia Technical and Economic College, Almaty, Kazakhstan.
Programming engineer, Cumputer programming
Dates attended or expected graduation 2005 – 2008
Certifications and trainings
- ISO/IEC 27000-27007; ISO/IEC 27011;
- Deployment, administration and configuration of F5 BIG-IP
- FudoPAM Security Certified Administrator
- Wallix Certified Professional / WCP-P
- BQ203 IBM® QRadar SIEM Advanced Topics
- IBM Power Systems for AIX - Virtualization I
- IBM Elastic Storage System (ES)
- Thycotic International Pre-Sales Engineer
- Infowatch DLP
- Palo Alto PSE: Strata Associate
- Palo Alto PSE: Foundamentals
- Fortinet Teleworker Solution: Engineered for Remote and Secure Productivity v6.2
- Fortinet NSE ZTNA Series
- McAfee EMEA Database Security
- McAfee EMEA Ad Hoc
- McAfee NSP lc
- McAfee ePO 5.1 lc
- McAfee EWS lc
- McAfee SIEM ACE
- McAfee DLP ACE
- McAfee NSP ACE
- MCP: Microsoft Certified Professional
Alexey Alexeyenko
linkedin | Astana, Kazakhstan | mobile: +7 701 7015340370 | alexeya@v-office.kz
Experience
**АО Транстелеком ** April 2017 – April 2019 (2 year)
- Системный администратор облочной ситемы интеллектуальной видеоаналитики KIPOD
АО «Национальная компания «Астана ЭКСПО-2017» April 2017 - April 2017 (6 months)
- Сетевой администратор (CISCO)
ТОО KT Cloud Lab April 2013 – April 2017 (4 year)
- внедрение и сопровождение облачной системы электронного документооборота,
- создание и ввод в эксплуатацию единой корпоративной сети республиканского контакт-центра (Астана, Караганда, Алматы)
- Администрировании программно –аппаратного комплекса республиканского контакт
АО «Казахтелеком» Дирекция информационных систем (группа внешних проектов) Сентябрь 2010 – April 2013 (2 year 8 month)
- Администрирование электронного документооборота на базе LOTUS NOTES (основная обязанность)
- Сетевой администратор (CISCO)
АО Республиканский диагностический центр March 2008 – September 2010 (2 year 7 month)
- Сетевой администратор (CISCO)
- Обслуживание систем видео наблюдения
- Техническая поддержка пользователей
АО «Казахтелеком», Дальняя связь March 2006 — March 2008 (2 year)
- внедрение электронного документооборота в филиалах и обучение пользователей.
- Техническая поддержка 5 серверов на базе LOTUS DOMINO и их кластеров
- Техническая поддержка пользователей
Education
Казахстанско-Российский университет, Караганда Информатика, Информатик Dates attended: 2001-2006
Skills
Lotus Domino: Lotus Domino R6 System Administration I: Installation, Configuration, Replication, Lotus Domino R6 System Administration II: User and Mail Administration,
Cisco: Interconnecting Cisco Network Technologies, Interconnecting Cisco Network Devices
Электронный документооборот (базовый курс)
Certification:
- Lotus Domino R6 System Administration I: Installation, Configuration, Replication,
- Lotus Domino R6 System Administration II: User and Mail Administration,
- Interconnecting Cisco Network Technologies,
- Interconnecting Cisco Network Devices,
- Электронный документооборот (базовый курс).
Alexey Gulchuk
linkedin | Astana, Kazakhstan | alexey@v-office.kz
Experience
V-office LLP (Kazakhstan), Information Security Advisor March 2017 – Present
Systems integrator company responsibilities:
- Information security audit and/or Penetration testing
- Company and customers processes optimization/development
- Information security Training for internal stuff (skills improvement, cyber security awareness)
- Customer infrastructure optimization
- Pilot project implementation with further deployment into production
- Securing business processes
- Cloud and network administration
SOC (Security Operation Center) as a service for telecom/service provider company:
- ISMS administration and control
- Incident response
- Forensics
- Vulnerability management
InfoSecurity, Information Security Incident Response Advisor May 2017 – February 2018 (9 months)
- Threat analysis, forensics
- Incident investigation, response, mitigation
NCOC, Head of ICT&IM Security August 2015 – June 2016 (11 months)
- Team management
- Provide regular reports for briefing to senior managers and members
- Develop ICT Security processes in line with ISO 27000
- Implement ICT Security controls in accordance with best practices
- Perform risk assessment for services and projects
NCOC, Senior ICT Business Integrity and Security Advisor July 2012 – August 2015 (3 year 2 months)
- Coordinate day-to-day tasks to provide subordinates and junior staff with required skills and knowledge as well as coaching them on long term strategic activities
- Develop information Security policies and procedures
- Develop ICT Security processes in line with ISO 27000
- Implement ICT Security controls in accordance with best practices
- Perform classroom sessions with theoretical materials delivery followed by hand-on training to provide subordinates and junior staff with skills and knowledge as required for day-to-day company activities and long term development
- Provide subject matter expert advice to ICT Management on forthcoming and existing company projects regarding ICT Security
- Provide regular reports for briefing to senior managers and members
- Participate in Change Advisory Board (CAB) including in depth analysis and sign-off regarding all ICT Security issues before implementation in production
- Monitor systems and conduct investigations of security incidents, breaches or suspected breaches to ascertain and determine the cause and make any recommendations for remedial action, including discipline, or legal action
- Perform risk assessment for services in production and projects
- Manage technical security penetration testing and oversight of control audits
- Provide proactive tools/scripts development to achieve risk reduction; increase service improvement; and deliver long-term information integrity.
- Advanced troubleshooting of Server operating systems & applications
- Provision of second and third line support for Service desk Personnel
NCOC , ICT Business Integrity and Security Advisor
June 2011 – July 2012 (1 year 1 month)
NCOC , Junior ICT Business Integrity and Security Advisor
March 2010 – June 2011 (1 year 1 month)
- Perform security assessment of changes on Change Advisory Board (CAB)
- Provide risk assessment for production services and projects
- Perform assessment of changes in laboratory environment before implementation in production. Report on results and provide expert advice to ICT Management
- Setup application configuration management both on server and client level
- Monitor, verify, analyse and report on logs related to ICT Security to ensure proper implementation and execution of workflows and tasks
Create reports concerning information on internet use and user abuse - Investigate and report on configuration weakness through analysis tools
- Perform physical security assessments on Server, Patch and communication rooms. Produce and analyse audit report on access to such rooms
- Perform periodic checks and manage ‘readiness-status’ with regards to Business Continuity Plan at ATC recovery site
- Coordination and oversight of information usage, access and structures with periodic report to relevant business or data owners
- Assisted in the formulation and set up of an ICT Security Investigation laboratory to investigate breaches or prepare new security tools for use and acceptance in production environment.
Data Loss Prevention; Document classification; Penetration testing
Education
Karaganda State Technical University
Electrical engineer, Electric drive and automation of technological complexes
Dates attended: 2001-2006
Skills
Microsoft: Exchange, TMG, Active Directory, SCOM, WSUS, MS PKI, GPO, NTFS permissions, Servers 2003/2008(R2)/2012(R2)/2016
McAfee: ePO, DLP, Antivirus; Kaspersky: Antivirus, KATA (SandBox), Mail Gateway
Virtualization: VMWare (ESX, ESXi),VCloud Director, Proxmox
Linux: Ubuntu, Debian (workstation/server), Backtrack, Kali (linux based penetration testing, forensics investigation tools), FreeBSD Unix
Vulnarability scanners: GFI, Nessus, nmap, OWASP, OVAL, Metasploit
Networking: Websense (WEB filtering tool), PaloAlto (NGFW), FireEye, IronPort, UTMbox(NGFW)
Scripting: Powershell, Python, GO
Certification:
- InfoWatch DLP
- 412-79: ECSAv4
- 312-49: CHFIv4
- 312-50: CEHv6
- Prince2 Foundation
- 70-290: Managing and Maintaining a Microsoft Windows Server 2003 Environment
Trainings
- ISO/IEC 27000-27007; ISO/IEC 27011;
- CISM: Certified Information Security Manager
- McAfee VirusScan and ePolicy Orchestrator Administration
- ECSA: EC Council Certified Security Analyst
- CISSP: Certified Information Systems Security Professional
- ITILv2: Service desk
- CHFI: Certified Hacking Forensics Investigator
- CEH: Certified Ethical Hacker
- McAfee DLP Administration
- Prince2: Projects In Controlled Environments
- 10135A: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010
- 2277: Implementing, Managing, and Maintaining a Microsoft® Windows Server™ 2003 Network Infrastructure: Network Services
- Risk management in information security
- 5927A: Microsoft Office Project Standard 2007, Managing Projects
- 2273: Managing and Maintaining a Microsoft Windows Server 2003 Environment
- Cobit
- ITILv3
Ken Tulegenov
Summary: • 10+ years of professional experience in Cyber Security • 10+ successfully completed Security Projects • Certifications: (ISC)² CISSP, Cisco CCNA Security, Microsoft MCSA • Industry Experience: Oil & Gas, Banking, CERT, Telecom, World Exposition (EXPO)
Specialization: • Identity & Access Control + Project Management
Subject Matter Expert: • Network Security / Endpoint Security / Infrastructure Security
Work Experience
Telecom Company, Cloud Engineer April 2018 — till now
Duties: VMware Cloud Office 365 Azure Active Directory
KEGOC JSC, Cyber Security Consultant December 2017 — March 2018
Prepared Documents: • Cyber Security Development Plan (2018-2022) • Architecture (Defense-in-Depth & Zero Trust for OT and IT Infrastructures) • Modern Technologies (Smart Grids) & Cyber Attacks (APT) • Requirements, Recommendations & Best Practices • Implementation Plan by Years
Cisco Systems, Cisco Security Engineer (SOC Analyst) May 2017 — October 2017
Astana EXPO 2017 SOC Team • Network Security (Log Management / SIEM, IPS/IDS, Firewalling, NTA) • Incident Handling & Response
NCOC NV, Cyber Security Engineer October 2015 — July 2016
• Network Security (Log Management / SIEM, IPS/IDS, Firewalling) • Infrastructure Security (Design, Rules, Requirements, Procedures) • Threat and Risk Analysis (ICS and SCADA Security)
Tsesnabank JSC, Information Security Project Manager May 2012 — September 2015
• Regulatory Compliance (Personal Data Law, PCI DSS) • Threat Analysis and Hardening (APT, Misconfiguration) • Project Management • Security Researches
KZ-CERT, Information Security Expert August 2011 — April 2012
• E-Gov Network Security (IPS/IDS, Firewalling) • Consulting for Public Organizations • Security Audit • Project Management
Kcell JSC, Information Security Engineer February 2006 — July 2011 5 years 6 months
• Corporate Wireless Administration • Security Compliance • Access for Partners (Dealers) and Vendors • Project Management
Skills
CISSP, Cloud Security, Cyber Security, Information Security, Windows Security, Network Security, Project Management, PCI DSS, ISO 27001, SOX 404, ITIL, Virtualization, Cisco, Check Point, Palo Alto, Fortinet, VMware, Linux, Python, PowerShell, Bash, Risk Management, Splunk, StealthWatch, SIEM
Education
Tomsk State University of Control Systems and Radioelectronics Bs. Automated Data Processing Systems
Courses & Certifications:
- Splunk Fundamentals 1
- Cybersecurity for ICS (Industrial Control Systems)
- Penetration Testing Training with Kali Linux
- Oracle Security 11g
- Oracle Database 11g: SQL Fundamentals / PL/SQL Fundamentals aqnd Development
- User Activity Monitoring (ObserveIT)
- VMware. VSphere: Install, Configure, Manage
- IBM. Tivoli Storage Manager 5.4. Implementation and Administration 1 / 2
- Allot NetExplorer (DPI)
- Cisco SNRS (Securing Network with Switches and Routers)
- Cisco SNPA (Securing Network with PIX and ASA)
- Check Point. CP Firewall NGX Administration 1 / 2 / 3
- Red Hat. Introduction / System Administration / Network and Security
- Basic Management Skills
- BSI. ISO/IEC 27001. Introduction / Implementation / Internal Audit
- BS 7799. Implementation / Risk Management / Practical Aspects
CISSP (Certified Information Systems Security Professional) Cisco CCNA : Security Cisco CCNA: Routing and Switching Microsoft MCSA: Network Infrastructure
Ruslan Safin
Chief Security Architect | DevSecOps Leader
13+ Years IT Experience | 9+ Years C-Level Security Leadership
CONTACT INFORMATION
- Phone: +375296419307
- Email: ruslanrsafin@gmail.com
- LinkedIn: https://linkedin.com/in/cybermaniac
- Location: Minsk, Belarus (Open to Hybrid/Relocation)
PROFESSIONAL SUMMARY
Chief Security Architect with 13+ years IT experience and 9+ years C-level security leadership. Proven expertise designing enterprise security architectures, building and scaling security teams, and delivering compliance-driven infrastructure. Deep expertise in Linux hardening (STIG/CIS), Kubernetes security, IPv6 architecture, and zero-trust implementations. Track record managing security across 75,000+ employees and building security programs from the ground up.
CORE EXPERTISE
Security Architecture & Leadership
Enterprise security architecture design, zero-trust network architecture, privilege access management, incident response, risk management, compliance (ISO 27001/27005), SOC design, M&A security integration
Infrastructure Security & Hardening
Linux hardening (STIG, CIS), Red Hat systems, Kubernetes (CKA), IPv6 architecture, VMware virtualization, network segmentation, next-generation firewalls (Cisco, Juniper, Palo Alto), Veeam backup and disaster recovery
Cloud & Infrastructure
AWS, GCP, Azure, Yandex Cloud security, Infrastructure-as-Code (Terraform, Ansible), vulnerability assessment (SAST, DAST, SCA), penetration testing, Docker and container security, compliance automation
Technical Skills
Penetration testing, forensics, incident response, Cisco/Juniper/CheckPoint networking, Veeam solutions, Red Hat systems, Python, Bash scripting
PROFESSIONAL EXPERIENCE
Information Security Architect
Fintech Company (NDA) | Sep 2025 – Present
Leading security architecture for large-scale enterprise infrastructure. Network segmentation design, vulnerability assessment, privilege access management, CIS/STIG compliance, red team operations. Infrastructure-as-Code implementation (Terraform, Ansible). Azure and OpenShift security.
DevOps TeamLead / Senior DevSecOps Engineer
Yandex | Apr 2023 – Sep 2025
High-load infrastructure development and security architecture leadership at Yandex — Russia’s largest tech company (NASDAQ-listed, $40B+ market cap, 100K+ employees). Managed security and infrastructure operations at scale.
Key Achievements:
- High-Load Infrastructure: Built and scaled infrastructure handling 300K+ RPS from development through production
- Zero-Trust Architecture: Implemented zero-trust network architecture with continuous posture monitoring
- Kubernetes Security: Kubernetes security hardening and advanced network implementations
- IPv6 Innovation: First IPv6-only Kubernetes implementation at Yandex with advanced networking capabilities
- Team Leadership: Managed DevSecOps team, security operations, CTF exercises, and zero touch prod approach
- Compliance & Monitoring: Established continuous compliance monitoring and security posture validation
Technologies: Kubernetes, Docker, Terraform, Ansible, Python, Ubuntu, Yandex Cloud, HashiCorp Consul, IPv6
Chief Security Systems Engineer
EPAM Systems, Inc, Belarus | Nov 2019 – Feb 2022
Security architecture leadership and zero-trust implementation for global technology company scaling from 25,000 to 75,000 employees. Managed team of 17 security professionals (architects, engineers, DevOps). Defined and executed security strategy during 3x organizational growth.
Key Achievements:
- Zero-Trust Architecture: Implemented enterprise-wide zero-trust architecture with continuous posture checks and automated compliance monitoring
- Privilege Access Management: Designed and deployed PAM program across 75,000+ employees
- Identity Governance: Implemented centralized identity management system
- Vulnerability Management: Established enterprise vulnerability assessment (SAST, DAST, SCA) and remediation program
- Compliance & Risk Management: Supported SOX audit, ISO 27001/ISO 27701, SOC 1/2/3, HIPAA/PCI DSS alignment, ISAE 3402 Type 2, and CREST accreditation compliance programs. Automated ISO 27001/27005 compliance monitoring with 24/7 posture validation
- Incident Response: Established enterprise incident response program and crisis management procedures
Technologies: Kubernetes, Docker, Terraform, Ansible, Linux, Red Hat, AWS, HashiCorp Vault, Palo Alto, Cisco, Juniper
Senior DevOps Engineer
Outsourcing Company | Feb 2022 – Mar 2023
Infrastructure and security engineering for enterprise clients. Kubernetes cluster management, disaster recovery, backup solutions, and performance optimization. Ansible automation and GitOps implementations.
Director of Information Security / CISO
Telecom (Top Telecom Operator, CIS Region) | Feb 2018 – Nov 2019
Security leadership for Kazakhstan’s largest telecommunications operator and top-3 telecom in CIS region (Central Asia & CIS with millions of subscribers). Security strategy, compliance management, incident response, security team management, DLP implementation, PAM program, and security awareness training. Security operations center (SOC) design and operations, ISMS administration, vulnerability management, and crisis management.
Business Development Manager
MONT Ltd | Apr 2012 – Apr 2013
Business development, client relationship management, and technical sales.
Senior Engineer / Team Lead
Kazakhtelecom (Top Telecom Operator, CIS Region) | Jul 2009 – Sep 2011
Network engineering and team management for critical infrastructure projects at Kazakhstan’s leading telecom. Led activities related to Organization for Security and Cooperation in Europe (OSCE) Summit 2010, Shanghai Cooperation Organization (SCO) Summit, and Islamic Development Bank Economic Forum (worldwide strategic projects requiring highest availability). Designed FTTB network infrastructure for Almaty city and surrounding region (3 million population, Central Asia’s largest city). Managed 7 engineers and 200+ equipment installers.
Technologies: Cisco networking, Linux systems, security implementation, infrastructure design
Independent Consulting
V-Office LLP | Oct 2009 – Present
Security consulting, infrastructure design, penetration testing, vulnerability assessment, compliance audits, and security awareness programs. Concurrent roles included CTO and team leadership positions with security architecture, infrastructure design, Linux administration, networking, security implementation, system design, and team mentoring responsibilities.
SPEAKING & TEACHING
Conference Presentations:
- Positive Hack Camp 2024 — Linux Privilege Escalation, Post-Exploitation, Pivoting & Persistence Techniques
- Sysconf.io 2019 — SELinux: Base, Tips and Tricks
Teaching & Mentoring: 10+ years mentoring IT professionals. 2+ years training in security and infrastructure. Security trainer for Linux, Kubernetes, Cisco R&S, and Information Security (ELTC LLP). University instructor in Information Security (KazATU University).
Hackathons: Served as a jury member at 8+ AI-focused hackathons in Russia (organized by RAEK — Russian Association of Electronic Communications) in 2022, evaluating projects in artificial intelligence, machine learning, and security applications.
PUBLICATIONS
Recent Publications (2022-2023):
- “Comparison of Information Security Methods of Information-Communication Infrastructure: Multi-Factor Authentication”
L.N. Gumilyov Eurasian National University Bulletin, Technical Sciences and Technology Series, No. 3(140), 2022
Co-authors: Safin R.R., Abdiraman A.S., Nurusheva A.M., Aldasheva L.S. - “Analysis of National Cybersecurity Strategies”
TELEMATIQUE, Volume 22 Issue 1, 2023, pages 2162-2169
Co-authors: Nurusheva A., Safin R., Satybaldina D.
Focus: Cybersecurity processes, national strategy impact, information security policy frameworks - “New Reality Strategy Proposal: Zero-Trust Methodology”
The Bulletin of KazATC, No. 4(127), 2023, pages 140-147
Co-authors: Nurusheva A., Safin R., Amrenov A., Satybaldina D.
Focus: Zero-trust architecture, remote access security, vulnerability assessment, hybrid user-system authentication models
Earlier Academic Publications (2008-2011):
Scientific and technical journals and international conferences on USB device management, Windows networking, educational technology, and professional development.
CERTIFICATIONS & TRAINING
| Certifications | Training |
|---|---|
| Certified Kubernetes Administrator (CKA) | CISSP Preparation Bootcamp (Nov 2025) |
| Hurricane Electric IPv6 rank Sage | Cyber Hygiene & OSINT (Nov 2025) |
| Red Hat Accredited Professional | ISO/IEC 27005 Risk Manager (Dec 2025) |
| Palo Alto Networks ATM, ACE, ASE | |
| VMware VCP, VTSP, VSP | |
| Microsoft MCP, MCTS (MS247, MS671, MS672, MS673) | |
| CyberArk Certified Engineer | |
| FireEye Product Specialist | |
| Symantec DLP & NetBackup Certifications |
TECHNICAL SKILLS
Security & Compliance:Security architecture, risk management, compliance (ISO 27001, ISO 27005), incident response, forensics, DLP, PAM, vulnerability assessment, penetration testing, hardening (CIS, STIG)
Infrastructure & Cloud: Linux (Red Hat, CentOS, Debian, Ubuntu), Kubernetes (CKA), IPv6, Docker, Terraform, Ansible, AWS, GCP, Azure, Yandex Cloud, GitOps
Virtualization & Storage: VMware vSphere, Red Hat Virtualization, KVM, Xen, Veeam Backup & Replication
Networking: Cisco (ASA, IOS, Catalyst), Juniper, Palo Alto, CheckPoint, Citrix NetScaler, load balancing, high availability
Monitoring & Tools: Wazuh, ELK Stack, Suricata, HashiCorp Vault, Teleport, Cloudflare, ZScaler
Programming & Scripting: Python, Bash
EDUCATION
Master of Science in Information Technology | 2007-2009
Karaganda State Technical University (KSTU), Karaganda, Kazakhstan
Credential evaluation confirmed by World Education Services (WES)
Master of Science in Microprocessor-based Systems in Industry | 2008
Saint Petersburg State Polytechnical University (SPbSTU), Saint Petersburg, Russia
Engineer of Information Technologies | 2002-2007
Karaganda State Technical University (KSTU), Karaganda, Kazakhstan
LANGUAGES
- Russian — Native
- English — B2 Speaking (Upper Intermediate), C1 Writing (Advanced)
PERSONAL INFORMATION
- Hobbies: Develop and maintain pet project — hosting server infrastructure using Docker, Ansible, Traefik and Cloudflare Workers
- References: Available upon request
Политика Конфиденциальности
Владелец сайта v-office.org (далее v-office или Администрация) обязуется сохранять Вашу конфиденциальность в сети Интернет. Настоящая Политика Конфиденциальности, рассказывает о том, как собираются, обрабатываются и хранятся Ваши личные данные. Администрация уделяет большое внимание защите личной информации пользователей. Пользуясь сайтом v-office, пользователь тем самым дает согласие на применение правил сбора и использования данных, изложенных в настоящем документе. Если Вы не согласны с условиями нашей политики конфиденциальности, не используйте сайт v-office!
Собираемая информация
Администрация сайта может собирать следующую информацию о пользователях сайта:
- Имя
- Адрес электронной почты
- IP-адрес
- Прочая информация
Использование информации
Ниже описаны некоторые способы использования личной информации пользователя:
- для внутреннего отчета
- для предоставления информации и услуг, которые запрашивает пользователь
- для ответа на запросы пользователя
- для формирования статистических данных
Раскрытие информации
Администрация не продает личные данные пользователя и не передает их третьим лицам без согласия на то пользователя. Далее, описаны некоторые случаи передачи личной информации пользователя:
- в случаях, если это требуется органам спецслужб или если это требует законодательство