Umiejętności
Active Directory
Agile Methodolgy
Android
Bash
Burp Suite
Analiza biznesowa
CompTIA
bezpieczeństwo komputerowe
Copywriting
migracja danych
Data Mining
Bazy danych
E-commerce
Eclipse
Fraud Detection
Haker (bezpieczeństwo komputerowe)
IBM Mainframe
Imperva
Bezpieczeństwo informacji
Audyt Wewnętrzny
iOS
Zarządzanie IT
Zarządzanie usługami IT
ITIL
Serwer aplikacji JBoss
McAfee
Merging
Metasploit
Migration Projects
Administracja sieci
Bezpieczeństwo sieci
Ryzyko Operacyjne
Oracle
OWASP
PaaS
Testy penetracyjne
PL / SQL
Play Framework
Inżynieria Procesowa
Zapewnienia Jakości
Reactive
Reuters
SaaS
Scala (język programowania)
Scalable Web Applications
Inżynieria oprogramowania
Software Planning
Zarządzanie projektami programistycznymi
Symantec Endpoint Protection
administracja systemami
Testowanie
Thompson
Testy jednostkowe
Wirtualizacja
Weblogic
Weblogic Administration
Windows Mobile
Merger integration
Kaspersky Lab
Nessus (software)
Oracle Data Mining
def3000
FuelPHP
Asseco
Google Web Toolkit(GWT), IceFaces, Asp.NET, PHP, JavaScript, SAjax
Analiza finansowa i prognozowanie
Comarch
Pentesty
Scrum, Agile Project Management
Kaspersky Security Center
Oracle Weblogic
OWASP TOP 10
Primesoft V-desk
Oracle ADF 12c
Metasploit Framework
Fraud Prevention
Ryzyko Płynności
Fraud Investigations
cargo-maven2-plugin
CompTIA Security +
OWASP Zed Attack Proxy
Fraud Analysis
Serwery IBM
Fraud Risk Management
Języki
polski
ojczysty
angielski
dobry
francuski
podstawowy
rosyjski
podstawowy
Doświadczenie zawodowe
Founder & CEO
SilenceOntheWire
IT and security process management; implementation of security systems and server services; implementation of Windows Server based systems; programming; process engineering; web applications creation in Java and Scala technologies: play framework, JPA 2.0, Ebean ORM, GWT, Vaadin, PHP7; creation of automated tests in Java web technologies: jUnit, jBehave; Creation of use cases and testing cases; frontend writing in AngularJS. Use Venafi PKI and CMS.
researcher
Infosec Institute
Software development; penetration testing; application programming in Java and PHP5, cooperation in development of Intense School project; training in field of new IT issues like safety of web applications, FTP protocol, implementation of agile software development. Agile evangelist.
Risk management, penetration testing according to OWASP, OSSTMM, ISSAF and NIST.
God knowledge to ISACA Cobit 5.
Risk management, penetration testing according to OWASP, OSSTMM, ISSAF and NIST.
God knowledge to ISACA Cobit 5.
Software Developer
Development of current customer solutions. Application development in Java, PHP (Zend Framework 3) and .NET.
Senior IP Protection Enginner
Dolby Laboratories
Reverse engineering, secure intelectual property, build android from sources, pentetration tests, artifactal intelligence projects.
Technology stack:
- C/C++
- Python
- Java, Kotlin, Scala
- Android
- JVM
- Enterprise Intelectual Property Protection systems and solutions
Technology stack:
- C/C++
- Python
- Java, Kotlin, Scala
- Android
- JVM
- Enterprise Intelectual Property Protection systems and solutions
Cyber Security Engineer
Sprawy24
I'm responsible for designing and implementing the best strategies to protect the internal network from unauthorized access. Somewhat of a hybrid of network engineers, system engineers and security architects. They have years of experience in several different areas of IT, so to be a successful applicant in this field, you’ll need to know the ins and outs of security analysis and design.
I must understand how to design architecture that protects the company. I many need to work with other security specialists to help mitigate damages during current attacks. Also responsible for identify any hardware or software issues that could be a future vulnerability, and work with managers to help change the architecture.
I do more building of architecture than monitoring systems. Usually builds new systems to help protect current networking assets.
Create new ways to provide security and penetration testing. Configure firewalls across the network. Perform penetration testing to identify vulnerabilities. Write automation scripts that identify issues regularly. Investigate current attacks and help stop cyber threats Create new processes for authentication, authorization and encryption algorithms. Keep current with the latest news and events surrounding cyber threats and security. Oversee changes to the network and deployment of software to ensure protection. Document and define corporate security policies. Analyze the latest in security policies and apply experience to protect the network. Recommend any changes to help protect corporate software.
I must understand how to design architecture that protects the company. I many need to work with other security specialists to help mitigate damages during current attacks. Also responsible for identify any hardware or software issues that could be a future vulnerability, and work with managers to help change the architecture.
I do more building of architecture than monitoring systems. Usually builds new systems to help protect current networking assets.
Create new ways to provide security and penetration testing. Configure firewalls across the network. Perform penetration testing to identify vulnerabilities. Write automation scripts that identify issues regularly. Investigate current attacks and help stop cyber threats Create new processes for authentication, authorization and encryption algorithms. Keep current with the latest news and events surrounding cyber threats and security. Oversee changes to the network and deployment of software to ensure protection. Document and define corporate security policies. Analyze the latest in security policies and apply experience to protect the network. Recommend any changes to help protect corporate software.
Senior Security Researcher
penetration tests
static and dynamic application analist
it risk management
Risk management, penetration testing according to OWASP, OSSTMM, ISSAF and NIST.
Good knowledge to ISACA Cobit 5.
Administration of Symantec DLP, IQP Secure Islands/MS RMS, Skyhigh, MS PKI, Microsoft Azure.
static and dynamic application analist
it risk management
Risk management, penetration testing according to OWASP, OSSTMM, ISSAF and NIST.
Good knowledge to ISACA Cobit 5.
Administration of Symantec DLP, IQP Secure Islands/MS RMS, Skyhigh, MS PKI, Microsoft Azure.
Researcher, Security Specialist
Implementation of Polish Financial Supervision Authority recommendations (Recommendation D and Recommendation about online payments); solutions evaluation; creation of applications; analyses; risk level reporting; penetration testing; creating software cooperating with transaction system and security system in Java (play framework+Ebean ORM). Risk management, penetration testing according to OWASP, OSSTMM, ISSAF and NIST.
Administration of Symantec DLP, IQP Secure Islands/MS RMS, Skyhigh, MS PKI, Microsoft Azure.
Administration of Symantec DLP, IQP Secure Islands/MS RMS, Skyhigh, MS PKI, Microsoft Azure.
Software Engineer / Security Evangelist / Freelancer
International Security Agency (ISA)
The creation of a library in Java, allows you to generate secure and strong passwords. (Java + + jUnit jBehave).
Main features:
check with the given password according to specific criteria
generating salt
key generation
Main features:
check with the given password according to specific criteria
generating salt
key generation
Edukacja
Specjalizacje
Badania i rozwój
Inne
Zainteresowania
development, haking, physics
Organizacje
RedTeam Associations of Penetration Testers
User Experience Professionals Association
CyberSecurity Inteligence Network
Information Security Research Association
ENISA
User Experience Professionals Association
CyberSecurity Inteligence Network
Information Security Research Association
ENISA
Inne
http://resources.infosecinstitute.com/author/adrian-stolarski/
http://www.intenseschool.com/resources/what-is-xprince/
http://www.linuxtoday.com/author/Adrian+Stolarski/
Sibversions:
SVN
GIT
Mercurial
Frameworki testowe dla Java:
jUnit
Instinct
JDave
JBehave
Mockinto
Frameworki testowe dla PHP:
Mockery
PHPUnit
Frameworki testowe dla C#:
NMock
EasyMock.NET
TypeMock Isolator
Rhino Mocks
Moq
NSubstitute
JustMock
FakeItEasy
Microsoft Fakes (formerly Moles)
+
Webdriver, SeleniumIDE, OWASP Tools, Metasploit Framework, ...
http://www.intenseschool.com/resources/what-is-xprince/
http://www.linuxtoday.com/author/Adrian+Stolarski/
Sibversions:
SVN
GIT
Mercurial
Frameworki testowe dla Java:
jUnit
Instinct
JDave
JBehave
Mockinto
Frameworki testowe dla PHP:
Mockery
PHPUnit
Frameworki testowe dla C#:
NMock
EasyMock.NET
TypeMock Isolator
Rhino Mocks
Moq
NSubstitute
JustMock
FakeItEasy
Microsoft Fakes (formerly Moles)
+
Webdriver, SeleniumIDE, OWASP Tools, Metasploit Framework, ...
Grupy
Wyższa Szkoła Biznesu w Dąbrowie Górniczej
Akademia WSB (do dnia 15 kwietnia 2018 roku Uczelnia
nosiła nazwę Wyższa Szkoła Biznesu w Dąbrowie Górniczej) to jedna z najlepszych uczelni niepublicznych w Polsce.
Aby POMÓC W 24 GODZINY
Misją tej grupy jest szybka pomoc na potrzeby jej uczestników. Wskazanie w nazwie grupy 24 godzin. Wszystkie nagłe sprawy, które musicie wykonać natychmiast.
ABY POMÓC W 48 GODZIN
Grupa ta ma na celu umożliwienie jej uczestnikom szybkie reagowanie na wzajemne potrzeby, nie tylko w wydaniu biznesowym. W założeniu skierowana do jak najszerszego ogrona osób, gdyż nigdy nie
ABY ZYSKAĆ W 48 GODZIN
Bezpłatne, Gratisy, Rabaty, Zniżki, Promocje, Bonusy, Wyprzedaże, Vouchery, Wejściówki. Zakupy grupowe ze zniżką. Zyskaj klientów w 48 godzin.
Analitycy IT
[b]UWAGA !!! Do grupy przyjmowane są osoby o pełnym i otwartym profilu UWAGA!!![/b]
Regulamin: § 36a. Zabrania się zamieszczania ogłoszeń o charakterze rekrutacyjnym na forach
Anioł Biznesu
Inicjatywa wspierająca polski biznes, kulturę i sztukę, łącząca animatorów, promotorów, artystów, twórców, inicjatorów, organizatorów, środowiska artystyczne, środowiska biznesowe, media..
Banking
Osoby pracujące w branży jak również wszystkie zainteresowane coraz dynamiczniej rozwijającymi się usługami bankowymi. Stwórzmy grupę, która będzie pomocna nie tylko dla nas, ale również dla pozostały
Bankowość, Finanse oraz Kredyty Hipoteczne
Grupa skierowana do osób zajmujących się na co dzień i w wolnym czasie bankowością i wszystkim co się tą dziedziną wiąże.
Bazy Danych
Zagadnienia bazodanowe: SQL99 i jego implementacje w popularnych systemach RDBMS: Oracle, MySQL, PostgreSQL, MSSQL, IBM DB2 i inne.