Frostbyte CTF 2025
I build and improve security monitoring, investigate incidents, and turn noisy alerts into clear, actionable decisions.
Cybersecurity Analyst focused on blue team operations, detection engineering, and incident response.
I help teams improve visibility and response by building practical detections, investigating suspicious activity, and hardening systems against common attack paths. Whether it's tuning SIEM correlation rules in Splunk or Elastic Stack, conducting malware static analysis, or mapping adversary behaviour to MITRE ATT&CK — I translate raw telemetry into actionable intelligence that defenders can act on.
My work blends hands-on lab environments with real-world operational thinking: alert triage, root-cause analysis, containment, and clear documentation that supports continuous improvement. I've competed at the top levels of Capture the Flag (CTF) competitions — placing 1st globally at Security BlueTeam Frostbyte 2025 and in the top 0.3% at Hack The Box Holmes 2025 (24th out of 11,342 teams).
I studied Chemistry (3 years) at Ambrose Alli University and Computer Science at Kharkiv National University of Radio-Electronics — an analytical foundation that directly strengthens how I approach threat hunting, digital forensics, and incident response (DFIR). I also served as an instructor for CompTIA Security+ at a U.S. Air Force Base in Germany, making complex security concepts accessible and practical for non-technical personnel.
My toolset spans Splunk, Elastic Stack, IBM QRadar, Velociraptor, Caldera, Volatility, Wireshark, Zeek, and beyond. I actively build and operate self-hosted cybersecurity lab environments — including a full purple team platform and a containerised SOC appliance — to stay sharp on detection engineering, adversary emulation, and reverse engineering.
Available for SOC roles, DFIR engagements, security architecture reviews, and blue team consulting.