Dmytro Benedyk
Malware Reverse Engineer at Polytech Software- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
English Professional working proficiency
-
Ukrainian Native or bilingual proficiency
Topline Score
Bio
Anatoly Prokofiev
Malware analysis takes time and time is of the essence. Dmytro is lightning fast in reversing malware. No wonder he prefers OllyDbg over IDA, solving most of the puzzles through the dynamic analysis. And while being fast he still manages to document his work thoroughly. His analysis reports on malware samples are neat and comprehensive, always a pleasure to read. You really need to see him in action.
Anatoly Prokofiev
Malware analysis takes time and time is of the essence. Dmytro is lightning fast in reversing malware. No wonder he prefers OllyDbg over IDA, solving most of the puzzles through the dynamic analysis. And while being fast he still manages to document his work thoroughly. His analysis reports on malware samples are neat and comprehensive, always a pleasure to read. You really need to see him in action.
Anatoly Prokofiev
Malware analysis takes time and time is of the essence. Dmytro is lightning fast in reversing malware. No wonder he prefers OllyDbg over IDA, solving most of the puzzles through the dynamic analysis. And while being fast he still manages to document his work thoroughly. His analysis reports on malware samples are neat and comprehensive, always a pleasure to read. You really need to see him in action.
Anatoly Prokofiev
Malware analysis takes time and time is of the essence. Dmytro is lightning fast in reversing malware. No wonder he prefers OllyDbg over IDA, solving most of the puzzles through the dynamic analysis. And while being fast he still manages to document his work thoroughly. His analysis reports on malware samples are neat and comprehensive, always a pleasure to read. You really need to see him in action.
Experience
-
Polytech Software
-
Ukraine
-
Software Development
-
100 - 200 Employee
-
Malware Reverse Engineer
-
Apr 2021 - Present
-
-
-
Deloitte
-
Business Consulting and Services
-
700 & Above Employee
-
Senior Cyber Security Consultant - Malware Analyst
-
May 2019 - Apr 2021
- Reverse engineering of malware samples - Writing scripts, tools, detection rules for analysis malware samples - Malware analysis detailed reports composing - Reverse engineering of malware samples - Writing scripts, tools, detection rules for analysis malware samples - Malware analysis detailed reports composing
-
-
-
Comodo
-
United States
-
Computer and Network Security
-
300 - 400 Employee
-
Malware Analyst / Reverse Engineer
-
Apr 2018 - Dec 2018
- Reverse engineering of malware samples - Malware analysis detailed reports composing - Reverse engineering of malware samples - Malware analysis detailed reports composing
-
-
-
Samsung Electronics
-
South Korea
-
Computers and Electronics Manufacturing
-
700 & Above Employee
-
Reverse Engineer
-
Jun 2016 - Sep 2018
- Reversing Android Applications (Incl. deobfuscation) - Analyzing security of Samsung mobile applications - Reversing Android Applications (Incl. deobfuscation) - Analyzing security of Samsung mobile applications
-
-
-
Zillya! Antivirus
-
Ukraine
-
Computer and Network Security
-
1 - 100 Employee
-
Malware analyst
-
Jul 2015 - Jun 2016
- Malware reversing - Malware analysis reports composing - Behavioral analysis of malware - HIPS rules development - Adding records of malware's signatures to the database - Malware reversing - Malware analysis reports composing - Behavioral analysis of malware - HIPS rules development - Adding records of malware's signatures to the database
-
-
-
-
Chief Specialist (information technologies)
-
Oct 2009 - Dec 2013
- System administration - Configuring networks and network devices (CISCO routers) - Setting up of a specialized client-server software (LIGA:ZAKON, D-3) - Generation and maintenance of digital signatures -Configuring and monitoring software for data backup (KLS Backup, APBackup, nnCron+nnBackup) - Automation of working processes - System administration - Configuring networks and network devices (CISCO routers) - Setting up of a specialized client-server software (LIGA:ZAKON, D-3) - Generation and maintenance of digital signatures -Configuring and monitoring software for data backup (KLS Backup, APBackup, nnCron+nnBackup) - Automation of working processes
-
-
Education
-
Ternopil State 'Ivan Pul'uj' Technical University
Specialist, Information Management Systems and Technologies -
Berdychev college of industry, economy and law
Junior Specialist, Programming for EC and automated systems