#CV #RedTeam #MalwareAnalyst #ReverseEngineer
Beyond traditional infrastructure, I bring deep expertise in low-level engineering and binary analysis. I write and debug x86 Assembly (NASM), understand PE file structure, and have hands-on reverse engineering experience โ including completing 4 out of 5 technical tasks for a malware analysis role at Kaspersky Lab. This gives me an uncommon edge in security-focused roles, Red Team support, and system internals.
I maintain a technical GitHub profile (
https://github.com/HopelessCompass) with 230+
I am currently based in Moscow and actively seeking relocation opportunities, with particular interest in security engineering or reverse engineering positions in innovative companies or international teams.