Ivan is proficient in programming languages such as Python, Java, and C++, and has a deep understanding of security frameworks, technologies, and product management methodologies. With a keen eye for detail and a comprehensive understanding of information security principles, Ivan has a proven track record of successfully managing information security programs, driving sales initiatives, and developing and launching security products.
San Francisco, Bay Area, Full Time
- Sales Representative
Jan 2021 - Present · 2 yrs 4 mos
- Security Product Manager
Mar 2021 - Present · 2 yrs 2 mos
Non-Disclosure Agreement · Full-time
Information Security Manager
Mar 2014 - Present · 9 yrs 2 mos
- Proficient in programming languages such as Python, Java, or C++ for developing security tools, automating security tasks, and analyzing security data.
- Familiarity with security frameworks such as NIST Cybersecurity Framework or ISO 27001 for implementing and managing information security programs.
- Experience with security technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), security information and event management (SIEM) systems, and vulnerability scanners for securing networks and systems.
- Proficient in product management methodologies and tools for defining product roadmaps, creating product requirements, and managing product releases.
- Familiarity with security product development lifecycle and understanding of security features such as authentication, authorization, encryption, and audit trails.
- CI/CD, API and application security programs
In addition to the above, a strong understanding of information security principles, risk management, compliance regulations, and industry standards such as GDPR, HIPAA, PCI DSS, etc.
More from the author
Unified Threat Management
Secure your network with Unified Threat Management. Get advanced protection against malware, ransomware and phishing attacks. Simplify your security today.
Discover the benefits and challenges of data localization, including increased security and compliance concerns. Explore how it impacts businesses.
Protect your cyber security by understanding dictionary attacks. Gain insight into how they work and steps you can take to safeguard your online accounts.
Discover how data skewing impacts big data processing and explore effective solutions to address this issue. Optimize your data analysis now!
Discover the dangerous trend of swatting, where prank callers falsely report crimes, endangering innocent lives and wasting valuable resources.
Discover the meaning of pseudonymization and how it can be used to protect personal data. Explore its benefits, challenges, and real-life examples.
Discover the dangers of Cybersquatting, a malicious practice of registering domain names similar to popular brands for profit. Protect your brand today.
Lazy loading is a technique used by websites to improve load times by only loading images and videos when they are needed. Speed up your site today!
DNS Tunneling Attack
rotect your network from DNS tunneling attacks. Learn how to detect, prevent and mitigate DNS tunneling attacks for safeguarding your DNS infrastructure.
Disaster Recovery Plan
Be prepared for the worst. Discover how to create a solid Disaster Recovery Plan to keep your business safe from unexpected disruptions.
Protect your web application from cyber attacks with WebSocket Security. Discover how to strengthen your system against potential threats.
Advanced Endpoint Protection - AEP
Discover how advanced endpoint protection can safeguard your digital assets. Learn about the latest tools & techniques in endpoint security.
Passwordless authentication - how it can improve your online security. Discover various methods, benefits, and best practices for a password-free future.
Wallarm Security Platform
Solutions by Cloud
Solutions by Industry
188 King St. Unit 508,