Plamen Semov

Plamen Semov Email and Phone Number

Distinguished Security Strategist @ Quickbase
Bulgaria
Plamen Semov's Location
Bulgaria, Bulgaria
About Plamen Semov

Seasoned cybersecurity engineer with over a decade of dedication to AI and cybersecurity. My mission is to revolutionize security operations centers (SOCs) through innovative ML frameworks and automation. As the Founder of my own consultant company, I champion the development of SIEM-free ML solutions for User Behavior Analytics (UBA) and eXtended Detection and Response (XDR) solutions, aiming to expedite threat detection with minimal false positives. My expertise in machine learning along with various security domains gives me an edge in creating innovative solutions with "out of the box" thinking.As an experienced cybersecurity engineer, I have gained extensive expertise and knowledge through diverse roles across various sectors. This experience has sharpened my technical skills in DevSecOps, threat analysis&detection, incident response, vulnerability management and security architecture. Additionally, I've developed strong team leadership and management skills, leading cross-functional teams for enhancing security posture, mentoring staff and contributing to strategic planning. My broad expertise ensures a proactive and strategic approach to protecting digital assets.P.S. "Judge me first by my way of thinking and actions. Critical and rational thinking can assist me with gaining knowledge and adaptability needed to navigate complex situations effectively."

Plamen Semov's Current Company Details
Quickbase

Quickbase

View
Distinguished Security Strategist
Bulgaria
Website:
quickbase.com
Employees:
850
Plamen Semov Work Experience Details
  • Quickbase
    Distinguished Security Strategist
    Quickbase
    Bulgaria
  • Vmware
    Senior Member Of Technical Staff
    Vmware Aug 2022 - Present
    โ€ข ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜ ๐—ผ๐—ณ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ผ๐—ป๐˜๐—ฒ๐—ป๐˜ ๐—ณ๐—ผ๐—ฟ ๐—ฎ ๐—–๐—ฆ๐—ฃ๐—  ๐—ฝ๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜: Create and refine security content, including policies, rules, and alerts, to enhance the effectiveness of CSPM product. Develop content that addresses security misconfiguration and meets customer needs.โ€ข A๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ผ๐—ผ๐—น: Developed AI framework with web UI for automating content creation and implemented ML for policy/compliance auto mappingโ€ข ๐—™๐—ฒ๐—ฎ๐˜๐˜‚๐—ฟ๐—ฒ ๐—ฆ๐˜‚๐—ฝ๐—ฝ๐—ผ๐—ฟ๐˜ ๐—ฎ๐—ป๐—ฑ ๐—˜๐—ป๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ๐—บ๐—ฒ๐—ป๐˜: Provide support for the development of new product features and enhancements. Collaborate with product managers, developers, and other stakeholders to ensure alignment with security objectives and clients requirements.โ€ข ๐—จ๐—˜๐—•๐—” ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜: Develop and implement User and Entity Behavior Analytics (UEBA) solutions. Utilize advanced analytics and machine learning techniques to detect and respond to anomalous behavior and potential security threats.โ€ข ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—˜๐—ป๐—ด๐—ถ๐—ป๐—ฒ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜: Design and enhance threat engine solutions to improve detection and response capabilities. Integrate threat intelligence and analytics into CSPM product to strengthen threat identification and mitigation processes.โ€ข ๐—–๐—น๐—ผ๐˜‚๐—ฑ ๐—œ๐—”๐—  ๐—˜๐—ป๐˜๐—ถ๐˜๐—น๐—ฒ๐—บ๐—ฒ๐—ป๐˜๐˜€: Work on developing and managing cloud IAM entitlements. Ensure that access controls are properly implemented and aligned with best practices and organizational policies.
  • Aivisec
    Founder
    Aivisec Feb 2018 - Present
    โ€ข ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—ถ๐—ป๐—ด ๐—ฎ ๐—ฆ๐—œ๐—˜๐— -๐—™๐—ฟ๐—ฒ๐—ฒ ๐—”๐—œ ๐—™๐—ฟ๐—ฎ๐—บ๐—ฒ๐˜„๐—ผ๐—ฟ๐—ธ: Creating an innovative SIEM-free AI solution specializing in User Behavior Analytics (UBA) and Extended Detection and Response (XDR). This framework is helping SOC teams reduce false positives and quickly create detection rules and correlations.โ€ข ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐—™๐—ฟ๐—ฎ๐—บ๐—ฒ๐˜„๐—ผ๐—ฟ๐—ธ: Designing a comprehensive vulnerability management system, integrating security scans into the CI/CD pipeline and infrastructure for continuous vulnerability assessment and mitigation.โ€ข ๐— ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—ฅ๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ฒ ๐—˜๐—ป๐—ด๐—ถ๐—ป๐—ฒ๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด: Conducting in-depth reverse engineering to analyze malicious software, enhancing detection and response strategies.โ€ข ๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ผ๐—ป ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ ๐—ง๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ๐˜€: Leading research on evolving attacker techniques, developing dynamic behavioral algorithms and modules to detect and prevent network attacks and endpoint exploits.โ€ข ๐—”๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ณ๐—ผ๐—ฟ ๐— ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐——๐—ฎ๐˜๐—ฎ ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€: Developing automation scripts to streamline malware and data analysis, increasing efficiency and response speed in security operations.โ€ข ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฎ๐—ป๐—ฑ ๐—™๐—ผ๐—ฟ๐—ฒ๐—ป๐˜€๐—ถ๐—ฐ๐˜€ ๐—–๐—ผ๐—ป๐˜€๐˜‚๐—น๐˜๐—ฎ๐—ป๐—ฐ๐˜†: Providing consultancy in cybersecurity and digital forensics, offering strategic advice and hands-on support to strengthen defenses and respond to incidents.โ€ข ๐—จ๐—ป๐—ถ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ถ๐˜๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ท๐—ฒ๐—ฐ๐˜๐˜€ ๐—ผ๐—ป ๐— ๐—ผ๐—ฏ๐—ถ๐—น๐—ฒ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†: Participating in university research projects on mobile networks and cybersecurity, focusing on machine learning applications to enhance security measures and gain hands-on experience with cutting-edge technologies.
  • Technologyvalley
    Ml And Security Consultant
    Technologyvalley Mar 2017 - Present
  • Gfk
    Senior It Security Analyst (Devsecops/Application Security)
    Gfk Nov 2021 - Aug 2022
    โ€ข ๐—œ๐—ป๐˜๐—ฒ๐—ด๐—ฟ๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ต๐—ฒ๐—ฐ๐—ธ๐˜€ ๐—ถ๐—ป ๐—–๐—œ/๐—–๐—— ๐—ฃ๐—ถ๐—ฝ๐—ฒ๐—น๐—ถ๐—ป๐—ฒ: Implementing security checks within the CI/CD pipeline, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Cloud Security Assessment (CSA), Software Bill of Materials (SBOM), and secret scans to ensure code security throughout the development lifecycle.โ€ข ๐——๐—ฒ๐—ฝ๐—น๐—ผ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฆ๐—ฐ๐—ฎ๐—ป๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒโ€ข ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐—บ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜: Overseeing vulnerability management processes to identify, assess, and remediate security vulnerabilities across applications and infrastructure.โ€ข ๐—”๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ฒ๐—ฑ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐˜๐˜† ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐—ฆ๐˜†๐˜€๐˜๐—ฒ๐—บ: Developed automated Vulnerabilty Management System for CI/CD scans in parallel and forwarding the results into DefectDojo for triage.โ€ข ๐—–๐—ผ๐—ป๐—ฑ๐˜‚๐—ฐ๐˜๐—ถ๐—ป๐—ด ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„๐˜€โ€ข ๐—–๐—ผ๐—น๐—น๐—ฎ๐—ฏ๐—ผ๐—ฟ๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐˜„๐—ถ๐˜๐—ต ๐—ฆ๐—ข๐—–: Working closely with the Security Operations Center (SOC) to deploy and fine-tune potential new alerts utilizing Machine Learning for enhanced threat detection and response.โ€ข ๐—˜๐˜…๐—ฒ๐—ฐ๐˜‚๐˜๐—ถ๐—ป๐—ด ๐—”๐—ฑ-๐—›๐—ผ๐—ฐ ๐—”๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ฎ๐˜€๐—ธ๐˜€: Handling various ad-hoc automation tasks to streamline security processes and improve overall efficiency within the security operations.โ€ข ๐—–๐—ฟ๐—ฒ๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฑ๐—ฎ๐˜€๐—ต๐—ฏ๐—ผ๐—ฎ๐—ฟ๐—ฑ: Participating in the development of a CTO-level monthly security dashboard featuring a security grade from A to F for each business area. This initiative fostered a sense of competition and significantly reduced security risks, enhance awareness and drive action.
  • Shutterfly
    Senior Cybersecurity Engineer | Emea Team Lead
    Shutterfly Jun 2018 - Nov 2021
    โ€ข ๐—ง๐—ฒ๐—ฎ๐—บ ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ๐˜€๐—ต๐—ถ๐—ฝ: Leading a team of security analysts across the EMEA region, providing guidance, support, and oversight to ensure effective delivery of SOC services and alignment with organizational security goals.โ€ข ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—ฒ๐—ฑ ๐— ๐—Ÿ ๐—ถ๐—บ๐—ฝ๐—น๐—ฒ๐—บ๐—ฒ๐—ป๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ณ๐—ผ๐—ฟ ๐—จ๐—˜๐—•๐—”: Developed internal UEBA tool with ML. Successfully detected/correlated numerous security incidents and effectively correlated independent anomaly alerts from a regular penetration test, which were not apparent and missed with the classical SOC approach.โ€ข ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜: Oversee the identification, assessment, and remediation of vulnerabilities to strengthen the client's security defenses.โ€ข ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—š๐—ฎ๐˜๐—ต๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด: Collect and analyze threat intelligence to stay ahead of emerging threats and inform proactive security measures.โ€ข ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—›๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด: Actively seek out and identify potential threats within the clientโ€™s environment through advanced threat-hunting techniques.โ€ข ๐—ฆ๐—ฝ๐—น๐˜‚๐—ป๐—ธ ๐—Ÿ๐—ผ๐—ด ๐—œ๐—ป๐—ด๐—ฒ๐˜€๐˜๐—ถ๐—ผ๐—ป: Develop Python agents for log forwarding using Kafka or REST API, ensuring seamless integration and ingestion of log data into Splunk.โ€ข ๐—ฆ๐—ข๐—”๐—ฅ ๐—จ๐˜€๐—ฒ ๐—–๐—ฎ๐˜€๐—ฒ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜: Design and implement SOAR use cases to streamline incident response and automate repetitive tasks.โ€ข ๐—ฆ๐—ฝ๐—น๐˜‚๐—ป๐—ธ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ผ๐—ป๐˜๐—ฒ๐—ป๐˜ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜: Develop Splunk rules and dashboards tailored to SOC requirements, providing actionable insights and improving threat detection capabilities. Develop Splunk add-ons for task automation, enhancing operational efficiency.โ€ข ๐—˜๐—ป๐—ฑ๐—ฝ๐—ผ๐—ถ๐—ป๐˜ ๐—ฉ๐—ถ๐˜€๐—ถ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐—ฎ๐—ป๐—ฑ ๐—”๐—ป๐—ผ๐—บ๐—ฎ๐—น๐˜† ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป: Implement machine learning models using Apache Spark (AWS EMR) or Python modules for distributed/parallel processing to enhance endpoint visibility and detect anomalies.โ€ข ๐—”๐—ฑ-๐—›๐—ผ๐—ฐ ๐—”๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป
  • Huawei Technologies
    Senior Machine Learning Engineer
    Huawei Technologies Jul 2017 - Jan 2018
    Paris Area, France
    โ€ข ๐—™๐—ฟ๐—ฎ๐—บ๐—ฒ๐˜„๐—ผ๐—ฟ๐—ธ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜ ๐—ณ๐—ผ๐—ฟ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ฆ๐—ถ๐—บ๐˜‚๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Design and develop innovative frameworks to simulate mobile networks and traffic patterns. Create high-performance models that accurately represent network behavior under various conditions to support analysis and decision-making.โ€ข ๐—ง๐—ฟ๐—ฎ๐—ณ๐—ณ๐—ถ๐—ฐ ๐— ๐—ผ๐—ฑ๐—ฒ๐—น๐—ถ๐—ป๐—ด: Develop and refine models to simulate different types of network traffic, including user behavior, data flows, and application demands. Ensure models are capable of handling diverse scenarios and accurately predicting network performance.โ€ข ๐—ฆ๐—ฒ๐—น๐—ณ-๐—ข๐—ฟ๐—ด๐—ฎ๐—ป๐—ถ๐˜‡๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—”๐—น๐—ด๐—ผ๐—ฟ๐—ถ๐˜๐—ต๐—บ๐˜€: Design and test machine learning-based algorithms that enable network self-organization. Focus on algorithms that allow networks to adapt to changing conditions, optimize resource allocation, and improve overall network resilience.โ€ข ๐—”๐—น๐—ด๐—ผ๐—ฟ๐—ถ๐˜๐—ต๐—บ ๐—ง๐—ฒ๐˜€๐˜๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—ฉ๐—ฎ๐—น๐—ถ๐—ฑ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Conduct rigorous testing and validation of simulation frameworks and machine learning algorithms. Ensure accuracy, scalability, and reliability of developed solutions through comprehensive performance evaluations.โ€ข ๐—–๐—ผ๐—น๐—น๐—ฎ๐—ฏ๐—ผ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ป๐˜๐—ฒ๐—ด๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Work closely with other engineering teams and stakeholders to integrate designed algorithms into existing testing network infrastructure. Provide technical support and guidance to ensure seamless implementation.โ€ข ๐——๐—ผ๐—ฐ๐˜‚๐—บ๐—ฒ๐—ป๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ป๐—ฑ ๐—ฅ๐—ฒ๐—ฝ๐—ผ๐—ฟ๐˜๐—ถ๐—ป๐—ดโ€ข ๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ป๐—ป๐—ผ๐˜ƒ๐—ฎ๐˜๐—ถ๐—ผ๐—ป
  • Hewlett Packard Enterprise
    Security Operation Center Analyst
    Hewlett Packard Enterprise Oct 2015 - Jul 2017
    โ€ข Accepting and analyzing security incidents related to the supported customer environment.โ€ข Identifying all symptoms of the reported incident in order to establish the effect on customer business operations.โ€ข Employment of diagnostics scripts, tools, known error databases and knowledge base to assist with the initial diagnosis and determining possible applicable solution, temporary fixes and workarounds.โ€ข Generic troubleshooting within the applicable technology platform that Security Operations Center Analyst is responsible for.
  • Telenor Bulgaria
    Ran Development Engineer
    Telenor Bulgaria Feb 2014 - Mar 2015
    Bulgaria, Sofia
    โ€ขโ€ขโ€ข Distinguished Recognition: Earned a company distinguished reward for significant contributions to the successful renovation project, highlighting exceptional performance and impact.Key Responsibilities:โ€ข ๐—ฆ๐˜‚๐—ฝ๐—ฝ๐—ผ๐—ฟ๐˜ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ฃ๐—น๐—ฎ๐—ป๐—ป๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜: Assist in the planning and development of GSM/UMTS networks across the country, ensuring effective deployment and optimization.โ€ข ๐—–๐—ฎ๐—ฝ๐—ฎ๐—ฐ๐—ถ๐˜๐˜† ๐—ฅ๐—ฒ๐—ฐ๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Support the process of reconfiguring the capacity of existing base stations to meet evolving network demands and enhance performance.โ€ข ๐—–๐—ฒ๐—น๐—น ๐—ฃ๐—น๐—ฎ๐—ป๐—ป๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—Ÿ๐—ถ๐—ป๐—ธ ๐—•๐˜‚๐—ฑ๐—ด๐—ฒ๐˜ ๐—–๐—ฎ๐—น๐—ฐ๐˜‚๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€: Conduct Nominal Cell Planning, plan BSC (Base Station Controller) borders, and perform Link Budget Calculations based on prepared projects to ensure optimal network coverage and efficiency.โ€ข ๐—ฆ๐—ถ๐˜๐—ฒ ๐—–๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ฎ๐—ด๐—ฒ ๐—”๐˜€๐˜€๐—ฒ๐˜€๐˜€๐—บ๐—ฒ๐—ป๐˜: Prepare computer simulations and evaluate the planned site coverage and existing mobile network performance to identify areas for improvement.โ€ข ๐—”๐—ป๐˜๐—ฒ๐—ป๐—ป๐—ฎ ๐—ฆ๐˜†๐˜€๐˜๐—ฒ๐—บ ๐——๐—ฒ๐˜€๐—ถ๐—ด๐—ป: Design base station antenna systems to ensure robust and reliable network connectivity.โ€ข ๐—ง๐—ฒ๐—ฐ๐—ต๐—ป๐—ผ๐—น๐—ผ๐—ด๐˜† ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜ ๐—ฎ๐—ป๐—ฑ ๐—œ๐—บ๐—ฝ๐—น๐—ฒ๐—บ๐—ฒ๐—ป๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Contribute to the development and implementation of modern technologies within the mobile network to drive innovation and enhance service quality.โ€ข ๐—ฃ๐—ฟ๐—ผ๐—ท๐—ฒ๐—ฐ๐˜ ๐—œ๐—ป๐˜ƒ๐—ผ๐—น๐˜ƒ๐—ฒ๐—บ๐—ฒ๐—ป๐˜: Participate in key projects such as the Rollout 2014/15 and the Renovation of the Telenor mobile network 2014/15, contributing to their successful completion and deployment.
  • Btc, Vivacom
    Physical Network Architect
    Btc, Vivacom Jun 2011 - Aug 2012
    Bulgaria, Sofia
    โ€ข ๐——๐—ฒ๐˜€๐—ถ๐—ด๐—ป๐—ถ๐—ป๐—ด ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ: Developing detailed designs for optical cable infrastructure, ensuring that solutions are scalable, reliable, and aligned with client requirements and industry standards.โ€ข ๐—ฃ๐—ฟ๐—ผ๐—ท๐—ฒ๐—ฐ๐˜ ๐—ข๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ถ๐—ด๐—ต๐˜: Managing the end-to-end deployment process of optical cable infrastructure, including planning, coordination, and execution, to ensure timely and successful project completion.โ€ข ๐—ฉ๐—ฒ๐—ป๐—ฑ๐—ผ๐—ฟ ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜: Overseeing third-party vendors involved in the installation and construction of optical cable networks. Ensuring that vendors adhere to project specifications, quality standards, and safety regulations.โ€ข ๐—–๐—น๐—ถ๐—ฒ๐—ป๐˜ ๐—–๐—ผ๐—น๐—น๐—ฎ๐—ฏ๐—ผ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Engaging with business clients to understand their specific needs, providing expert recommendations, and offering ongoing support throughout the project lifecycle.โ€ข ๐—ค๐˜‚๐—ฎ๐—น๐—ถ๐˜๐˜† ๐—”๐˜€๐˜€๐˜‚๐—ฟ๐—ฎ๐—ป๐—ฐ๐—ฒ: Conducting regular inspections and assessments to ensure that the installed infrastructure meets design specifications and performance standards. Addressing and resolving any issues or discrepancies.โ€ข ๐——๐—ผ๐—ฐ๐˜‚๐—บ๐—ฒ๐—ป๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ป๐—ฑ ๐—ฅ๐—ฒ๐—ฝ๐—ผ๐—ฟ๐˜๐—ถ๐—ป๐—ด: Maintaining comprehensive documentation of design plans, project progress, and vendor performance. Providing regular updates and reports to clients and internal stakeholders.โ€ข ๐—–๐—ผ๐—บ๐—ฝ๐—น๐—ถ๐—ฎ๐—ป๐—ฐ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—•๐—ฒ๐˜€๐˜ ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ๐˜€: Ensuring that all aspects of the optical cable infrastructure adhere to relevant regulations, industry best practices, and company policies.โ€ข ๐—ง๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—ฐ๐—ฎ๐—น ๐—˜๐˜…๐—ฝ๐—ฒ๐—ฟ๐˜๐—ถ๐˜€๐—ฒ: Utilizing deep technical knowledge of optical cable systems, network architecture, and related technologies to solve complex problems and optimize infrastructure performance.

Plamen Semov Education Details

Frequently Asked Questions about Plamen Semov

What company does Plamen Semov work for?

Plamen Semov works for Quickbase

What is Plamen Semov's role at the current company?

Plamen Semov's current role is Distinguished Security Strategist.

What schools did Plamen Semov attend?

Plamen Semov attended Technical University Sofia, Technische Universitรคt Darmstadt, Aalborg Universitet, Aalborg University, Technical University Sofia.

Who are Plamen Semov's colleagues?

Plamen Semov's colleagues are Vaishnavi Mande, Antonio Kamp, Danny Lowe, Stephie William, Aleksandar Georgiev, Chris White, Chetan Pruthi.

Not the Plamen Semov you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.