Sergiy Lapin

Sergiy Lapin Email and Phone Number

Security Lead @ Spryker
Sergiy Lapin's Location
Karlsruhe, Baden-Württemberg, Germany, Germany
About Sergiy Lapin

More than 5 years of experience as Chief Information Security Officer, 16 years of experience as IT Security Engineer, 6 years of experience as Network Engineer and OPS, and more than 23 years overall experience in IT.Summary of skills:• Architecture review of IT projects from the security point of view• Penetration testing • Ethical hacking• Vulnerability assessments• Solid knowledge of Linux, Unix and Windows• Cloud security (AWS, Azure)• Static code analysis, static application security testing, software composition analysis (SAST&SCA)• Dynamic application security testing (DAST)• Reverse engineering• Malware analysis and malicious code (including identifying anti-analysis techniques, i.e., encryption, obfuscation, virtual machine detection, and packers). • Mitigation of DDoS-attacks • Comprehensive knowledge of analyzing networks and in-depth knowledge of common network protocols (TCP/IP stack and DNS, SMTP, DHCP, etc.)• Familiar with industry standards (ISO 27001, NIST 800, SOC2 Type I and II, PCI DSS, ITIL)• Working experience with Firewalls and WAF• Intrusion Detection Systems/Intrusion Prevention System, SIEM• Knowledge of cryptography and encryption• Risk assessments• Threat modeling (STRIDE/DREAD models)• Good management skills, analytical skills, and experience with project management• Experience with automation tools (Terraform, Ansible, Puppet, Chef) • Knowledge of cloud-based solutions and virtualization (AWS, Azure, Docker, VMWare, VirtualBox, Vagrant)• Programmer skills (Python, PHP, Bash shell, PowerShell scripting, Assembler) • Good communication skills, both oral and written• Responsive, organized, and excellent problem solver• Ability to learn and apply new technologies effectively and fast

Sergiy Lapin's Current Company Details
Spryker

Spryker

View
Security Lead
Sergiy Lapin Work Experience Details
  • Spryker
    Security Lead
    Spryker Oct 2020 - Present
    Berlin, Germany
  • Deutsche Bank
    Senior Information Technology Security Consultant (Forensics And Apt Teams)
    Deutsche Bank Oct 2020 - Jun 2021
    Eschborn, Hesse, Germany
    Cyber Forensics project of Deutsche Bank - worked via Diesec GmbH:• Created concept of Forensics migration to the Azure cloud-based on IaC (infrastructure as code)• Defined RBAC model for Forensics roles in the cloud• Automation for typical scenarios of data acquisitionAPT project of Deutsche Bank - worked via Diesec GmbH: • Arranged regular internal and external penetration tests (including onsite tests)• Managed end-to-end delivery of 80+ application security assessments• Application penetration tests (APT) scope definition• Analyzed security test reports, draw conclusions from results• Vulnerability management - in collaboration with other teams• Managed a bug bounty for APT• Analyzed APT security reports in order to be compliant with bank policies
  • Tipico
    Security Tech Lead (Security Service Owner)
    Tipico Oct 2016 - May 2020
    Karlsruhe Area, Germany
    • Managing of security team (I have conducted security meetings and established security awareness program across Tipico Group) • Ethical hacking, conducted manual external and internal penetration testing• Managing by Akamai Kona Site Defender and Bot Manager Premier. As result - DDoS attacks and Dictionary attacks with bots mitigated (91% fraud reduction)• Detected big amount of critical vulnerabilities (XSS, Session fixation etc.) in several products. Proposed remediation strategies, changes to SDLC and particular fixes for applications • Regular vulnerability assessments, produced advisory reports regarding 0-day exploits, CVE vulnerabilities, current network issues• Integrated static code analysis with Veracode + SonarQube into CI/CD • Malware analysis, network and security incidents forensics• Performed risk assessments to ensure corporate compliance, maintenance external audits (ISO, PCI DSS)• Mitigated risks and dispute false positives with auditors as result we got compliant with PCI DSS for Danish company• Enterprise cybersecurity threats I have mitigated and documented with written procedures (according to ISO 27001). Successfully passed ISO 27001 certification. #PenetrationTesting, #EthicalHacking, #Akamai, #DDoSProtection, #BotProtection, #VulnerabilityAssessments, #StaticCodeAnalysis, #MicroFocus, #Nessus, #KaliLinux, #Acunetix, #WPScan, #SecureSDLC, #Forensics, #ISO27001, #PCIDSS, #SecurityAudits, #AWS, #SonarQube
  • Deutsche Bank
    External It-Security Consultant (Core Build Vulnerability Assessment Team)
    Deutsche Bank Nov 2017 - Dec 2018
    Eschborn, Germany
    • Serve as vulnerability management analyst as primary responsibility• Penetration Testing to identify critical flaws in applications and systems that cyber attackers could exploit• Conduct vulnerability assessments for networks, applications and operating systems• Perform information system security vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components• Perform compliance scanning to analyze configurations and facilitate implementation of configurations and hardening settings for networks, operating systems, applications, databases, and other information system components• Use automated tools (e.g. Nessus) to pinpoint vulnerabilities and reduce time-consuming tasks• Use manual testing techniques and methods to gain a better understanding of the environment and reduce false negatives• Validate remedial actions and ensure compliance with information security policy and regulatory requirements• Develop, test and modify custom scripts and applications for vulnerability testing• Manually validate report findings to reduce false positives• Compile and track vulnerabilities over time for metrics purposes• Write and present a comprehensive Vulnerability Assessment reports• Review and define requirements for information security solutions• Engage with stakeholders, to include IT professionals, management, and auditors, to facilitate vulnerability discovery and remediation• Recommend appropriate remedial actions to mitigate risks and ensure information systems employ appropriate level of information security controls#VulnerabilityAsssessments, #Nessus, #KaliLinux, #PenetrationTesting, #Solaris, #AIX, #RHEL, #F5, #WindowsServer, #Windows7, #Windows10
  • Recycling Line Ltd.
    Co-Owner
    Recycling Line Ltd. Nov 2011 - Sep 2016
    Zaporizhia Region, Ukraine
    Product managementManagement of organizationSalesFinanceNegotiationsCommunications with suppliersCommunications with fiscal authorities
  • Abitec Group
    It-Security Consultant
    Abitec Group Apr 2011 - Sep 2016
    Zaporizhia Region, Ukraine
    • Identify potential risk, consult on correcting or reducing risk, report if uncorrected• Perform Vulnerability assessments on projects• Ethical hacking and Penetration Testing on projects or existing infrastructure• Consult Security Operations Team on security events• Establishes and maintains a framework to ensure that information security policies, technologies and processes are aligned with the business regulations of the organization• Ensures that risk identification, mitigation controls and analysis are integrated into application life cycle and change management processes• Reverse engineering, code review and scripts analysis• Static code analysis with Fortify• Software protection architect and was involved in development security related software#PenetrationTesting, #SecurityConsulting, #VulnerabilityAssessments, #EthicalHacking, #ReverseEngineering, #InformationSecurityPolicies, #CodeReviews, #SecureSDLC, #Fortify, #StaticCodeAnalysis, #ArchitectureReviews
  • Securityscorecard Inc.
    It-Security Engineer (Remotely)
    Securityscorecard Inc. Mar 2015 - Dec 2015
    Greater New York City Area
    • Information gathering and perform scans • Penetration Testing and Vulnerability assessments on projects• Risk assessment• Ruby and bash scripting#Network, #nmap, #Ruby, #Bash, #Pentests, #VulnerabilityAssessements, #RiskAssessments
  • Megapolis
    Chief Information Security Officer (Ciso)
    Megapolis Apr 2006 - Apr 2011
    Zaporizhia Region, Ukraine
    • Provided direct technical and business leadership to a growing team of Security Analysts, IT security engineers and network engineers.• Provided oversight for all security related issues, which included risk management, security, and technology audits. Analyzed and resolved a variety of configuration errors within the setup of the company's intrusion detection system. Managed various security scans for the network environment, providing identification of vulnerabilities. Monitored and supported the company network while resolving issues on policy infrastructure, spoofed IP addresses, and reported virus alerts. Performed configurations of network equipment and the specific commands for configuration changes.• Coordinated vulnerability identification and assessment activities from end to end, including collection of requirements, writing of specifications, driving schedules, managing execution.• Conducted in-depth penetration tests and static code analysis in support of assessment process.• Advises corporate officers and management committees on security and regulatory compliance matters• Well-versed in regulations and standards related to risk management and security, security policy development and compliance (according to ISO 27001).• Clearly communicates security and risk management concepts to non-technical audiences. • Developed procedures and automation for data-loss-prevention (DLP)• Implementation of web access control (WebSense) and AntiSPAM (IronPort, SpamAssassin).• IDS/IPS (Snort+ACID, Suricata) deployment and tuning, firewall reviews, and servers hardening.#Pentesting, #Compliance, #ISO27001, #IDS, #IPS, #VunerabilityAssessments, #AntiVirus, #MalwareAnalysis, #Firewalls, #ActiveDirectory, #AntiSPAM, #IronPort, #Websence, #SecurityAudit, #Snort, #WindowsServer, #Linux, #Hardening, #DDoSProtection, #RiskAssessment
  • Dupoint Corporation (Usa Company)
    Linux System Administrator
    Dupoint Corporation (Usa Company) Jan 2006 - Apr 2006
    Kiev Region, Ukraine
    • System Administration high-advantage Linux RedHat, Debian, SUSE, Linux HA servers.• IT-Security audit of servers and Penetration testing of services during SDLC. • Servers hardening, securing and DDoS mitigation.• Load Balancing Apache Server• LVM Load Balancing• Parallel distributed file system (Lustre, GlusterFS)• Clustering - Postfix/CourierIMAP/MySQL • Load Balancing VOIP (Asterisk+OpenSer [Kamailio])• Configuring authentication (FreeRadius+OpenLDAP)• Unix programming C/C++ • H.323, SIP video conferencing web-based software• The design documentation, develop local Wiki.#RedHat, #Linux, #Debian, #SUSE, #IT-Security, #Pentests, #LoadBalancers, #VOIP, #Asterisks, #FreeRADIUS, #C/C++, #SIP, #Postfix, #CourierIMAP, #MySQL, #Lustre, #GlusterFS, #Firewalls
  • Jsc (Isp) Cn Link
    Chief Technology Officer (Cto)
    Jsc (Isp) Cn Link Nov 2004 - Dec 2005
    Zaporizhia Region, Ukraine
    • Network design• Organization of cabining• User support organization• Involved in development a Business Plan and Tariffs• Billing system and related software (for user side) development (C/C++, HTML, PHP, Visual C)• Servers administration (DNS, Proxy (Squid), Webservers (Apache), RDBMS (PostgreSQL, MySQL) )• Game servers: Installation, configure and maintenance. PvPGN (Diablo , StarCraft, WarCraft), Diablo closed server, Unreal Tournament, Counter Strike, Half Life, Quake 3• File servers - multi level access system (under NFS, Samba and Proftpd).• Communication server’s installation and management: IRC, Jabber, SEChat, Postfix (with virtual domains and Webmail)• Implement proxy redirector with dynamic access management• Develop and implement DLP procedures and backup software• Manage Internet channels and build routing policy (BGP, OSPF, RIP) • IT-Security audit, firewall maintenance and security related software development• Relations with ISPs, other networks and suppliers• Configure VOIP (OpenH323, Gatekeeper)• Statistics development (based on MRTG)#Networks, #Routing, #Firewalls, #Billing, #VOIP, #FreeBSD, #Postfix, #DNS, #PHP, #C/C++, #Samba, #FTP, #Cabining
  • Humanitarian University
    Unix System Administrator (Remotely)
    Humanitarian University "Zaporozhe Institute Of The State And Municipal Management" Oct 2003 - Oct 2005
    Zaporizhia Region, Ukraine
    #FreeBSD, #OpenBSD, #Firewalls
  • Conkurent, Llc
    Linux/Unix System Administrator (Remotely)
    Conkurent, Llc Jul 2003 - Jan 2005
    Zaporozhe, Ukraine
    #FreeBSD, #Linux, #RedHat
  • Abitec Development Llc
    Team Lead
    Abitec Development Llc Nov 2003 - Nov 2004
    Zaporozhe, Ukraine
    • Reverse engineering, code review and scripts analysis• Ethical hacking, Penetration testing during SDLC• IT-Security consulting on projects and clients• Vulnerability assessment• Project management- The design documentation;- Drawing up a project plan;- Coordination of the timing;- Risk analysis;- Participation in the selection and approval of the project team;- Split the product into components and the distribution of the executors;- Determining the resources required and the working environment, their distribution within the command;- Prioritize tasks;- Organization of work teams around the required tasks;- Retention of the team in working condition, motivation of the team;- The creation of a transparent medium of communication between all stakeholders;- Communication with the customer, the management of its expectations;- Providing the customer reporting on the implementation of the tasks and the project as a whole;- Presentation to the customer ready-made solutions, demos, prototypes;- Interviewing new team members.• Team lead- Architecture development; - Define technologies stack for the project; - Research & Development; - Code reviews; - Mentoring juniors;- Conducting technical interviews;- Involve new team members in the working process; - Responsible for the technical part of the project;- Hands-on development some parts of projects (PHP, Perl, Python, C/C++, Visual C, Delphi/Kylix, ASM, MySQL, PostgreSQL, MSSQL)#PHP, #C/C++, #Python, #PenetrationTesting, #Perl, #MySQL, #PostrgeSQL, #SecureSDLC, #VulnerabilityAssessments, #Architecture, #CodeReviews, #Assembler
  • Cybernet Software Systems Inc
    It-Security Analyst (Remotely)
    Cybernet Software Systems Inc Sep 2003 - Jun 2004
    Singapore
    • Perform Vulnerability assessments on projects• Ethical hacking and Penetration Testing on projects • Consult Security Operations Team on security events• Servers security audit (scan for rootkits, service configuration weakness, permissions, weak passwords, suspicious processes and activity)• Servers administration consulting (configuration IDS/IPS, firewalls, services tuning, kernel tuning, system hardening, DDoS mitigation) • Reverse engineering, code review and scripts analysis• Web pages validation #PenetrationTesting, #VulnerabilityAssessment, #Security, #SecurityAudit, #Pentest, #ReverseEngineering, #Hardening, #Firewalls, #IDS
  • Zaporozhe State Engineering Academy
    System Administrator
    Zaporozhe State Engineering Academy Oct 2000 - Sep 2003
    Zaporozhe, Ukraine
    #Networks, #Unix, #BillingSystem, #PostgreSQL, #Delphi, #PHP, #C/C++, #Assembler, #ReverseEngineering, #Hardening, #Firewalls

Sergiy Lapin Education Details

  • Zaporozhye
    Zaporozhye
    Mechatronics, Robotics, And Automation Engineering

Frequently Asked Questions about Sergiy Lapin

What company does Sergiy Lapin work for?

Sergiy Lapin works for Spryker

What is Sergiy Lapin's role at the current company?

Sergiy Lapin's current role is Security Lead.

What schools did Sergiy Lapin attend?

Sergiy Lapin attended Zaporozhye.

Not the Sergiy Lapin you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.