Dmitry Sevostiyanov

DevOps Engineer

Delta, British Columbia, Canada27 yrs 3 mos experience
Highly Stable

Key Highlights

  • Expert in vulnerability and attack surface management.
  • Proven track record in cybersecurity governance.
  • Strong engineering background enhances risk mitigation strategies.
Stackforce AI infers this person is a Cybersecurity expert with a focus on infrastructure and risk management.

Contact

Skills

Core Skills

Vulnerability ManagementIdentity And Access Management (iam)Security Information And Event Management (siem)Information Security GovernancePrivileged Access ManagementChange ManagementZero Trust ArchitectureSystems AdministrationDisaster RecoveryNetwork SecurityTechnical Support

Other Skills

Security Assertion Markup Language (SAML)RADIUSRed Hat Enterprise Linux (RHEL)VirtualizationVulnerability ScanningOperating SystemsTACACS+PaloAlto FirewallsCisco TechnologiesActive DirectoryDNSAzure SentinelPowershellSingle Sign-On (SSO)Multi-factor Authentication

About

I’m a seasoned cybersecurity professional with a strong background in protecting organizations from digital threats. My expertise includes vulnerability and attack surface management, identity and privileged access controls, network security, and security governance. I draw on my engineering background to break down complex technical risks and translate them into clear, actionable strategies. I also create structured documentation, processes, and policies that strengthen organizational resilience and align with critical cybersecurity priorities. Over the course of my career, I’ve led risk assessments, developed change management frameworks, and conducted Red Team evaluations that helped safeguard sensitive systems in highly regulated environments. I’m passionate about advancing cybersecurity practices that not only protect individual organizations but also contribute to the security of critical infrastructure.

Experience

27 yrs 3 mos
Total Experience
6 yrs 10 mos
Average Tenure
--
Current Experience

Boeing

5 roles

Vulnerability and Attack Surface Management, Boeing Enterprise Security

May 2023Present · 3 yrs · Richmond, British Columbia, Canada · Hybrid

  • Conducted comprehensive network and host-based assessments using Red Team methodologies and advanced penetration-testing tools, identified exploitable vulnerabilities, and coordinated remediation aligned with NIST SP 800-115, NIST Cybersecurity Framework, and DoD/DFARS requirements to strengthen system resilience against cyber threats.
  • Deployed and managed Rapid7 across Boeing Subsidiary environment: configured scan sites and tailored scan policies to align with organizational risk priorities; enabled credentialed scans on network devices to improve detection accuracy and coverage; and developed custom, risk based reports to support prioritized remediation and continuous monitoring.
  • Partnered with cross-functional development teams to strategically address application vulnerabilities, proactively reducing technical debt and improving the security of the software development lifecycle.
  • Architected and implemented a secure and resilient Identity, Credential, and Access Management (ICAM) posture by deploying CyberArk Privilege Cloud (SaaS) and enforcing SmartCard/MFA authentication for privileged Windows and Linux user accounts. This initiative secured high-value accounts and mitigated a primary vector for credential-based attacks.
  • Created and maintained detailed Threat and Risk diagrams for datacenter environments, applying engineering methodologies to model complex system dependencies and failure points. This documentation supported compliance with NIST SP 800-30 and NIST SP 800-53, enabling stakeholders to visualize risks, prioritize mitigations, and demonstrate security posture for federal requirements.
  • Supported security audits and risk assessments, strategically mapping remediation efforts to NIST CSF, NIST SP 800-171/800-53 control families, and DFARS requirements to ensure the protection of Controlled Unclassified Information (CUI).
Security Assertion Markup Language (SAML)RADIUSRed Hat Enterprise Linux (RHEL)VirtualizationVulnerability ScanningInformation Security Governance+62

Subsidiary Operation, Boeing Enterprise Security

Promoted

May 2021Mar 2023 · 1 yr 10 mos

  • Engineered and deployed a distributed Splunk logging infrastructure with centralized client management and custom dashboards. This platform provided advanced threat detection and generated automated compliance reporting (NIST, DFARS), significantly enhancing the enterprise's security posture and its ability to meet stringent federal requirements.
  • Implemented a centralized, secure log collection framework by leveraging Windows Event Collector and Syslog with in-transit TLS encryption. This initiative provided a single pane of glass for security analysis by integrating with Microsoft Sentinel SaaS, thereby dramatically improving threat detection capabilities.
  • Architected, built, and deployed an Active Directory reporting framework that was adopted as a corporate standard across multiple Boeing subsidiaries. This framework provides continuous, automated monitoring of privileged accounts, password hygiene, MFA adoption, and security anomalies, directly informing enterprise-wide risk posture.
  • Established and implemented a comprehensive service account governance framework, reducing organizational risk by enforcing least-privilege policies and best practices for non-human identities.
Security Assertion Markup Language (SAML)RADIUSRed Hat Enterprise Linux (RHEL)VirtualizationVulnerability ScanningInformation Security Governance+62

Identity and Privileged Access Management, Boeing Enterprise Security

Mar 2020May 2021 · 1 yr 2 mos

  • Engineered and deployed an enterprise access control solution using Cisco Identity Services Engine (ISE), enforcing advanced authentication, authorization, and network monitoring for wired and wireless infrastructure.
  • Developed and automated secure provisioning workflows for BYOD devices, including certificate-based enrollment and mobile device management (MDM) integration to enforce security policy from the endpoint.
  • Architected and implemented a robust, multi-tier PKI infrastructure, creating a foundation for secure certificate-based authentication, encryption, and digital signatures across the enterprise.
  • Secured a virtual desktop infrastructure (VDI) by implementing a federated identity solution (VMware Identity Manager, Okta IDaaS) and a secure gateway (VMware UAG), reducing the attack surface for remote access.
  • Enforced a hardened security posture for network devices by deploying TACACS+ with two-factor authentication for administrative access and authorization.
  • Led the implementation of a single sign-on (SSO) and MFA framework for multiple applications using SAML, significantly improving security while enhancing user experience.
  • Implemented a robust SSL/TLS decryption solution on Palo Alto firewalls, significantly enhancing the visibility and detection capabilities for threats hidden within encrypted traffic.
  • Architected and implemented a secure network segmentation strategy to isolate industrial control systems (ICS), directly mitigating risk and preventing lateral movement in the event of a compromise.
Security Assertion Markup Language (SAML)RADIUSRed Hat Enterprise Linux (RHEL)VirtualizationVulnerability ScanningInformation Security Governance+61

IT Solutions Architect, Subsidiary Operation

Promoted

Mar 2015Mar 2020 · 5 yrs

  • Architected and led the development of an Change Management framework for a Boeing subsidiary, creating standardized policies and procedures that improved auditability, risk tracking, and ensured compliance with NIST, ITIL, and DoD cybersecurity change control requirements.
  • Engineered and deployed a Zero-Trust security architecture using VMware NSX, implementing micro-segmentation and least-privilege firewall policies to contain threats and prevent lateral movement.
  • Led the strategic migration and optimization of security infrastructure, transitioning legacy firewalls to a high-availability Palo Alto Next-Generation Firewall cluster while refining policies to eliminate redundancies and enhance security posture.
  • Designed and implemented secure remote access solutions, deploying MFA on Cisco ASA and Palo Alto firewalls. This included federated SAML-based authentication for contractors and clientless web portals for external partners.
  • Re-architected and secured a datacenter network with Cisco Nexus switches in a fault-tolerant configuration, migrating from legacy hardware with zero downtime.
  • Enforced a hardened security posture for network infrastructure by implementing TACACS+ with MFA for device management and authorization.
  • Designed and deployed secure application infrastructure for Internet-facing workloads, implementing web application firewalls to protect against common web-based attacks.
  • Designed and implemented a comprehensive DR datacenter, leveraging a multi-vendor stack including VMware, NetApp, and Nutanix for enterprise-wide business continuity.
  • Engineered and implemented data protection strategies using a suite of technologies (Veeam, CommVault, NetApp) to ensure the replication and recoverability of VM, CIFS, and NFS data.
  • Led and facilitated full-scale DR testing, conducting successful application failovers and table-top exercises to validate recovery procedures, identify procedural gaps, and strengthen organizational resilience.
Cisco UCSNetworkingSecurity Assertion Markup Language (SAML)WirelessRADIUSRed Hat Enterprise Linux (RHEL)+76

Senior Systems Administrator

Jan 2013Mar 2015 · 2 yrs 2 mos

  • Engineered and maintained highly-available server infrastructure, providing advanced Windows and Linux server administration and support for mission-critical applications.
  • Architected and managed a secure, resilient VMware virtual infrastructure to support enterprise-wide operations and business continuity.
  • Designed and administered network security architecture, including Cisco Nexus switches, Juniper, and Palo Alto firewalls, to enforce perimeter defense and ensure secure, highly-available network access.
  • Managed and optimized NetApp storage systems to ensure data integrity, availability, and enterprise data management.
  • Led the design and implementation of highly-available database clusters for Microsoft SQL and Oracle, ensuring continuous operation for core business services.
  • Developed enterprise-level SQL Server Reporting Services (SSRS) reports, providing business intelligence critical to management decision-making and operational efficiency.
  • Established and enforced IT department standards for SQL Server administration, leveraging industry best practices to reduce organizational risk and enhance security.
  • Oversaw the installation and configuration of Java application servers (Oracle Weblogic, JBoss, Tomcat) to host and secure corporate business applications.
  • Engineered and deployed an automated system management solution using Microsoft System Center Configuration Manager (SCCM), implementing a centralized framework for asset inventory, application management, patch management, and automated OS deployment.
  • Led corporate projects for the implementation, upgrade, and migration of critical business applications, collaborating directly with management and end-user communities to ensure project success and seamless knowledge transfer.
Cisco UCSNetworkingSecurity Assertion Markup Language (SAML)WirelessRADIUSRed Hat Enterprise Linux (RHEL)+78

Fraser surrey docks

Systems and Network Administrator

Jul 2004Jan 2013 · 8 yrs 6 mos · Surrey, British Columbia, Canada

  • Designed, implemented, and administered complex Windows Server infrastructures, including Active Directory, Group Policy, and essential network services (DNS, DHCP, WINS, PKI), ensuring secure and uninterrupted operations in a high-stakes, regulated environment.
  • Administered Linux/Unix systems across RedHat, CentOS, Oracle, and Ubuntu distributions, demonstrating adaptability and technical breadth in supporting diverse platforms critical to port operations.
  • Deployed and managed VMware ESXi and Microsoft Hyper-V clusters, incorporating High Availability and Fault Tolerance solutions to strengthen resiliency against disruptions.
  • Led large-scale network infrastructure management, covering switches, routers, firewalls, wireless access points, fiber-optic cabling, maintaining efficient and reliable communications essential for national trade logistics.
  • Engineered resilient storage solutions (iSCSI, Fiber Channel SAN, NAS) with performance tuning, replication, and fabric management, reinforcing data availability in a mission-critical environment.
  • Implemented and maintained cybersecurity defenses, including antivirus, patch management, secured VPNs, firewalls, and proxy servers, directly supporting cybersecurity resiliency.
  • Administered enterprise databases (Microsoft SQL, Oracle), ensuring secure backups, interoperability, and business continuity for core port operations.
  • Configured and managed web and application servers, to maintain secure, scalable platforms.
  • Developed proactive monitoring and alerting systems with SCCM and SCOM, enabling efficient and strategic response to performance issues before they escalated.
  • Automated administration tasks with VBScript, WMI, and PowerShell, improving efficiency while freeing resources for higher-value security and resilience initiatives.
  • Led disaster recovery planning and testing, conducting system backups, recovery operations, and resilience exercises to strengthen continuity under regulatory oversight.
NetworkingWirelessRed Hat Enterprise Linux (RHEL)VirtualizationSoftware InstallationVulnerability Scanning+40

Wolverton securities ltd.

Practicum Student

Mar 2004May 2004 · 2 mos · Vancouver, BC

  • Supported daily IT operations with a proactive and disciplined approach, ensuring reliable services across the organization.
  • Configured and deployed workstations, installed software, and adapted solutions to meet changing user needs.
  • Provided collaborative and resourceful help desk support, resolving issues efficiently while maintaining a humble, service-focused attitude.
Software InstallationOperating SystemsVirtual Private Network (VPN)AntivirusWindowsTechnical Support+5

Heidelberg

2 roles

Service Engineer

Sep 2000Oct 2002 · 2 yrs 1 mo

  • Planned and supported installations of advanced printing and graphic equipment, providing technical support to ensure reliable operations.
  • Delivered on-site training for customers and team members, improving skills and building long-term operational capacity.
Software InstallationInternational collaborationOperating SystemsTechnical SupportTroubleshooting

Service Engineer

Aug 1996Aug 2000 · 4 yrs

  • Acted as liaison between Manufacturing and Service Engineers, fostering collaboration to resolve technical challenges efficiently.
  • Proactively planned and coordinated customer installations, including customization of printing equipment to meet unique operational needs.
  • Facilitated technical training sessions for technicians and customers, providing resourceful guidance to improve knowledge transfer and long-term system performance.
Software InstallationInternational collaborationOperating SystemsMaintenanceService EngineeringTechnical Support+2

Moscow polytechnic university

Systems Administrator

Feb 1994Sep 1996 · 2 yrs 7 mos · Moscow, Russian Federation

  • Installed and maintained PCs, MS-DOS, and MS Windows in a fast-paced university environment.
  • Built and supported computer networks with Novell NetWare, including cabling and infrastructure upgrades.
  • Diagnosed and upgraded hardware and networking equipment to improve system performance.
  • Installed operating systems and supported custom mechanical modeling software, enabling research and academic innovation.
  • Resolved complex hardware and software issues, ensuring system reliability for faculty, researchers, and students.
  • Delivered user support and training, contributing to a stable, efficient, and research-ready environment.
NetworkingSoftware InstallationOperating SystemsDisaster RecoveryAntivirusTechnical Support+1

Education

Moscow Polytechnic University

Bachelor of Science — Mechanical Engineering

Sep 1991Jun 1996

CDI College

Network and Internet Security Specialist (With Honors) — Network and Internet Security

Jan 2003Jan 2004

Stackforce found 100+ more professionals with Vulnerability Management & Identity And Access Management (iam)

Explore similar profiles based on matching skills and experience