Hire Dedicated Cyber Security Specialists in Ukraine

Cyber Security Specialists are responsible for providing security during the development stages of software systems, networks, and data centers ensuring company data remains secure and protecting against cyberattacks. They check for vulnerabilities and risks in both hardware and software, handle and track any attacks and intrusions, identify the potential threat, or attempted breach by closing off the security vulnerability.


Cyber Security Specialist

Avg. annual salary


48 000

Mission Critical Skills for a

Cyber Security Specialist

A Cyber Security Specialist’s job is to make sure, during all the development stages of software, that both hardware and software parts are safe. He will build firewalls, and design strategies towards a defensive system. He is responsible for monitoring and sealing any threats or breaches intruders might cause.

  • A profound understanding of user authentication methods, firewall configuration, vulnerability testing, and security administration
  • Good understanding of programming languages such as C, C++, Java, and PHP
  • Familiarity with various security tools such as Burp Suite, Nmap, Nessus, Qualys, Metasploit, etc.
  • The ability to prevent security breaches by analyzing systems, researching ever-evolving risks, suggesting improvements, and implementing changes
  • Experience in Dynamic Application Security Testing and conducting code reviews
  • Experience in maintaining IT security controls documentation
  • Problem-solving, critical thinking, and communication skills
  • Certification in Cyber Security

Does your project require a

Cyber Security Specialist

Every website or app needs to be secure, in order to keep their customers safe, which means you probably need one too, if you are not willing to risk all your clientele. 

A Cyber Security Specialist can help with

  • providing security direction to the business and project stakeholders
  • describing and documenting the impact of security policies, standards, and architecture

Looking to quickly and safely hire this talent? You’ve come to the right place.

The world’s most ambitious tech companies and startups choose Make it in Ukraine Java freelancers to scale their teams, execute high-velocity projects and ship groundbreaking products

Grag or scroll
Time to find the best match candidate
Recruiting fee
Quality guarantee
Failure rate
Pre-screened candidates
Termination costs
Make it
in Ukraine
Virtual platforms*
0-3 weeks
1-4 Months
Very low
Very high
Very high

Hire a top

Cyber Security Specialist

for your project

Hire this talent



I’m responsible for monitoring and the administrating of security devices and controls to prevent unauthorized access, modification, and/or unauthorized disclosure of company information. Also, I participate in developing programs and processes to ensure security protocols are not compromised and participate in administering security policies to control access to systems.

Skills & Expertise

  • Malware Analysis
  • node.js
  • JavaScript
  • Opencart
  • CSS
  • Cyber security
  • JSON
  • react
  • angular
  • Data Security
  • PhpMyAdmin
  • Network Security
  • Information Security
  • express
  • WordPress
  • MySQL
  • Android
  • mongodb
  • HTML
  • Security Incident Response
  • Penetration Testing
  • Java
  • Vulnerability Assessment
  • SQL



Dates of Employment: 2014 - Present (6 years)

Position: Cyber Security Scientist

As the cybersecurity scientist, I'm responsible for stopping multiple attacks across different systems, identify vulnerabilities in applications by analyzing open ports,
analyze insecure software configurations that are susceptible to malware infections and preventing SQL and NoSQL injections, by monitoring and interpretation of
essential system events throughout the network that include unauthorized behavior, malicious hacks, denial of service (DoS), anomalies, and trend analysis.

Reverse engineering:

  • Android: dex2jar, JD
  • GUI
  • iOS: otool, class-dump - z

Automatic and manual source code analysis:

  • Android: Androwarn, Andrubis, ApkAnalyser
  • iOS: Flawfinder, Clang Static Analyzer

Network traffic analysis at different places in the network (at the device, gateway or in itself VPN, SSL encrypted connections, analyzing the communicating process for internal components:

  • Android: Intents
  • iOS: objc_msgSend calls


Dates of Employment: April 2012 - 2014 (2 years)

Position: Web application security analyst


  • Monitor and manage security devices such as network and application firewalls, Intrusion Prevention Systems, VPN devices, and Security Incident and Event Management systems.
  • Provide technical support and consultation as it relates to network and multi-platform systems security configurations.
  • Resolves security-related operational issues reported through internal ticketing systems, including fault isolation and resolution for security devices and escalating.
    responses when necessary.
  • Ensures compliance with security policies and standards.
  • Provide information security awareness training to employees, contractors, and other third parties.
  • Responsible for observing all laws, regulations and other applicable obligations wherever and whenever business is conducted on behalf of the Company. Expected to work in a safe manner in accordance with established operating procedures and practices.
  • Performs other duties as assigned or required.


Dates of Employment: 2011 - 2012 (1 year)

Position: Cyber security researcher


Dates of Employment: 2010 - 2011 (1 year)

Position: Cyber Security Engineer


Lutsk National Technical University Master's degree, Cybernetics Security, 2014 - 2017

Volyn College Bachelor's degree, Computer Science, 2010 - 2014



Reverse engineer with 9 years of experience. Interested in reversing malware, logical and mathematical tasks.

Skills & Expertise

  • Antivirus
  • IDA
  • Malware Analysis
  • Reverse Engineering
  • OllyDbg
  • Embedded Linux
  • Cryptography
  • x86 Assembly
  • Python
  • Linux
  • Information Security
  • Delphi
  • Obfuscation
  • MySQL
  • C++
  • Android
  • Java
  • Software Development
  • Windows



Dates of Employment: May 2019 - Present (1 year 1 month)

Position: Senior Cyber Security Consultant - Malware Analyst


  • Reverse engineering of malware samples
  • Writing scripts, tools, detection rules for analysis malware samples
  • Malware analysis detailed reports composing


Dates of Employment: April 2018 - December 2018 (9 months)

Position: Malware Analyst / Reverse Engineer


  • Reverse engineering of malware samples
  • Malware analysis detailed reports composing

Samsung Electronics

Dates of Employment: June 2016 - September 2018 (2 years 4 months)

Position: Reverse Engineer


  • Reversing Android Applications (Incl. deobfuscation)
  • Analyzing security of Samsung mobile applications

ALLIT Service LLC (Zillya!)

Dates of Employment: July 2015 - June 2016 (1 year)

Position: Malware analyst


  • Malware reversing
  • Malware analysis reports composing
  • Behavioral analysis of malware
  • HIPS rules development
  • Adding records of malware's signatures to the database

Trostyanets court Vinnitska region

Dates of Employment: October 2009 - December 2013 (4 years 3 months)

Position: Chief Specialist (information technologies)


Ternopil State 'Ivan Pul'uj' Technical University Specialist, Information Management Systems and Technologies, 2009 - 2013

Berdychev college of industry, economy and law Junior Specialist, Programming for EC and automated systems, 2005 - 2009



Certified Network and Security Specialist. 10+ years of work with Networks and Telecommunications. 3+ years working with Cyber Security. Have positive
feedback and experience in the following areas:

  • The country's largest service provider (ISP) as Network Specialist & NOC Team Lead;
  • System integrator as Network and Security Solutions Specialist;
  • Biggest software development, IT Operations, and IT outsourcing company as Cyber Security Specialist.

Skills & Expertise

  • AutoIt
  • Telecommunications
  • VMware
  • VBScript
  • Juniper
  • Linux
  • Information Security
  • Troubleshooting
  • Cisco Technologies
  • Virtualization
  • Network Administration



Dates of Employment: October 2018 - Present (1 year 8 months)

Position: Senior Cyber Security Specialist


  • Audit and configuration hardening of network devices and infrastructure. New solutions testing and PoC providing.
  • Web proxy implementation and maintaining: SSL/TLS inspection, Antimalware engines, NTLM authentification, URL, content, and application filtration. Reporting services. Disaster recovery of their services. Optimization of web policies and exception list management.
  • Firewalls rules and policy optimization, risk analysis. Firewall change and approval management.
  • SIEM system maintenance, log sources management\customization. Manual DSM creation, events parsing, and using regular expressions. Tuning and optimization of Syslog\NetFlow sources. Building automated reports.
  • Work experience with enterprise-class antivirus solutions and vulnerability management system.
  • Information security incident response (Preparation, Detection, and analysis, Containment and eradication, Post-incident recovery).
  • Creating procedures and workflow for SoC specialists.


Dates of Employment: July 2014 - September 2018 (4 years 3 months)

Position: Senior Network Engineer

Implementation and support solutions: - BRAS (BNG) based on Juniper MX (PPPoE, IPoE, DHCP, NAT, AAA, Triple Play solutions). Integration with FreeRadius and customer billing system.


Dates of Employment: November 2011 - July 2014 (2 years 9months)

Position: NOC Team Lead


Dates of Employment: September 2008 - November 2011 (3 years 3 months)

Position: L3 Team Lead

Read more CV of
Cyber Security Specialist

Make it in Ukraine' explained in 60 sec

What else would you like to know?

Rated 4,6
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Do you have enough information to go ahead?
Powered by Verifalia email verification