Summary
Overview
Work History
Education
Skills
Accomplishments
Affiliations
Certification
Additional Information
Languages
Timeline
background-images
Oliver Jovanovski

Oliver Jovanovski

Kriva Palanka

Summary

Dynamic Cyber Security Specialist with a proven track record at Auth by Okta, enhancing security protocols and spearheading employee training initiatives. Expert in incident response and risk assessment, I foster team collaboration to fortify defenses against cyber threats, ensuring compliance with security regulations while promoting a culture of vigilance and awareness.

Diligent Desired Position with comprehensive background in cyber security, specializing in identifying vulnerabilities and implementing robust security measures. Successfully mitigated potential threats and ensured data integrity through effective risk management strategies. Demonstrated expertise in network security and incident response.

Cyber security professional with proven track record of safeguarding organizations from cyber threats. Known for implementing advanced security measures and enhancing system integrity. Valued team player with focus on collaboration and adaptability, leveraging analytical skills and proactive approach to ensure optimal security outcomes.

Cyber security professional, prepared to enhance organizational security through advanced threat detection and mitigation strategies. Developed and implemented security protocols that protect critical infrastructure and sensitive data. Known for collaborative efforts and adaptability in dynamic environments, with proficiency in network security and risk assessment.

Trusted Cyber Security Engineer with Number years protecting companies against both internal and external threats. Talented at preemptively detecting unidentified threat vectors and applying preventive measures to mitigate security flaws. Employs technological solutions and personnel training to harden both people and machines against malicious actors.

Diligent Desired Position with robust background in cyber security. Delivered key improvements in threat detection and incident response, enhancing overall system security. Demonstrated expertise in risk assessment and mitigation, along with proficiency in developing advanced security protocols.

Professional cyber network specialist with proven ability to deliver secure and efficient network solutions. Demonstrates strong skills in network architecture, cyber security protocols, and risk assessment. Focused on team collaboration and achieving optimal results, adaptable to changing project needs. Known for reliability, problem-solving abilities, and technical expertise.

Professional with strong expertise in backend software engineering and cyber security. Adept at leveraging programming languages, database management, and security protocols to drive impactful solutions. Known for team collaboration, adaptability, and delivering results in fast-paced environments. Skilled in problem-solving, system optimization, and maintaining secure data practices.

Developed expertise in managing and optimizing complex information systems within dynamic environments. Skilled in troubleshooting, network administration, and cybersecurity protocols. Looking to transition into new field where these transferrable skills can contribute to organizational success.

Developed robust skills in cybersecurity within collaborative and high-stakes environment. Specialized in threat assessment and network protection, ensuring integrity and confidentiality of sensitive information. Seeking to transition into new field, bringing strategic mindset and commitment to maintaining security standards.

Cybersecurity professional prepared for demands of managing and securing complex systems. Proven track record of implementing robust security protocols and leading teams through successful threat mitigation. Known for collaborative approach and adaptability, with expertise in risk management and incident response.

Offering strong foundation in IT principles and passion for continuous learning and development in dynamic environments. Brings thorough understanding of system architecture and cybersecurity measures, coupled with technical skills in networking and software management. Ready to use and develop expertise in these areas to excel in Desired Position role.

Cybersecurity professional with substantial hands-on experience in identifying and mitigating security threats. Known for collaborative approach and reliability, adapting swiftly to dynamic environments. Proficient in network security, risk assessment, and incident response, valued for problem-solving and analytical skills.

Information technology professional ready to deliver impactful solutions. Skilled in systems administration, network management, and cybersecurity. Strong focus on team collaboration and adapting to changing needs. Reliable and results-driven, with keen ability to troubleshoot and optimize IT infrastructures.

Offering solid foundation in IT principles and strong desire to learn and grow within field. Brings understanding of network management and cybersecurity essentials, combined with technical aptitude in troubleshooting and system support. Ready to use and develop analytical and technical skills in Desired Position role.

Cybersecurity professional with robust background in assessing and managing cyber risks. Known for thorough analysis and implementation of effective security protocols. Excellent team player with focus on collaboration and achieving organizational goals while adapting to evolving security needs.

Personable and analytical with strong foundation in cybersecurity principles and network defense strategies. Equipped with in-depth knowledge of threat detection and incident response, combined with skills in malware analysis and security information event management (SIEM). Dedicated to leveraging abilities to enhance organizational security posture and mitigate cyber threats.

Energetic and focused problem-solver with passion for technology and systems optimization. Thorough understanding of network configuration and cybersecurity principles, paired with proficiency in troubleshooting and technical support. Dedicated to leveraging skills to enhance operational efficiency and secure information systems.

Adaptable and analytical, with strong foundation in network security principles and protocols. Equipped with comprehensive knowledge of firewall configuration and network monitoring, complemented by proficiency in threat detection and mitigation. Capable of significantly enhancing network security posture and ensuring robust protection against cyber threats.

Offering solid foundation in cryptographic principles and strong desire to learn and grow within cybersecurity environment. Brings understanding of network analysis and signal intelligence, with proven ability to quickly acquire new technical skills. Ready to use and develop skills in data encryption and decryption in Desired Position role.

Developed technical expertise in network infrastructure and cybersecurity in fast-paced IT environment. Skilled in troubleshooting, configuring, and maintaining network systems, with focus on optimizing performance. Seeking to transition into new field, leveraging these transferrable skills to drive efficiency and innovation.

Offering solid foundation in cybersecurity principles and passion for teaching and mentoring. Brings strong understanding of information security concepts and practical skills in network security. Ready to use and develop these skills in Desired Position role.

Personable and driven, with solid foundation in IT principles. Knowledge of network configuration and cybersecurity, with skills in system troubleshooting and software installation. Prepared to deliver reliable technical support and contribute to efficient IT operations.

Knowledgeable Desired Position with strong background in managing information systems and ensuring seamless IT operations. Demonstrated success in implementing system upgrades and enhancing cybersecurity protocols. Proven skills in team leadership and problem-solving, consistently delivering reliable tech solutions.

Professional security architect with deep understanding of cybersecurity principles and robust track record in designing and implementing secure systems. Strong focus on team collaboration and adaptability to evolving security needs. Skilled in risk assessment, network security, and incident response. Known for delivering results and driving impactful security initiatives.

Information Technology professional with strong background in system administration, network management, and cybersecurity. Proven ability to enhance IT infrastructure and support organizational goals through effective collaboration and adaptive problem-solving. Equipped with skills in project management, software development, and user support, ensuring seamless integration and functionality. Reliable team player focused on delivering results and adapting to evolving technological demands.

Experienced with advanced network security protocols, including firewalls and intrusion detection systems. Utilizes skills in threat analysis to protect critical infrastructure. Strong understanding of risk management and cybersecurity best practices, ensuring robust network integrity.

Information and Communications Technology professional with strong track record in troubleshooting and maintaining IT systems. Skilled in network management, hardware and software support, and cybersecurity protocols. Focused on team collaboration and achieving optimal results, adaptable to changing needs, and reliable in delivering solutions. Known for effective problem-solving, technical expertise, and excellent communication skills.

Personable and strategic individual with deep understanding of cybersecurity principles and best practices. Knowledgeable in network security and threat assessment, with hands-on skills in risk management and incident response. Committed to safeguarding digital assets and creating secure environments.

Offering solid understanding of network security principles and strong foundation in cybersecurity best practices, eager to develop in professional IT Security environment. Brings ability to quickly learn and apply new security technologies and methodologies. Ready to use and develop skills in threat analysis and vulnerability assessment in Desired Position role.

Professional network engineer with strong focus on network infrastructure management, cybersecurity, and system optimization. Demonstrates exceptional ability in team collaboration, ensuring seamless operations and effective problem-solving. Renowned for adaptability and reliability in dynamic environments, excelling in roles requiring attention to network protocols, troubleshooting, and system maintenance. Highly valued for technical acumen and result-driven approach.

Skilled cybersecurity professional with comprehensive experience in managing complex security infrastructures. Strong focus on team collaboration and delivering results, adaptable to evolving challenges. Proficient in threat analysis, risk management, and incident response, with proven track record of enhancing organizational security posture. Dependable and effective leader, fostering culture of security awareness and continuous improvement.

Energetic and analytical with strong foundation in risk management and network security. Deep understanding of threat assessment combined with proficiency in implementing cybersecurity protocols. Committed to safeguarding organizational assets and ensuring robust security measures.

IT leader with strong background in managing and optimizing technology infrastructures. Proven track record in driving impactful IT projects and leading teams to achieve strategic goals. Known for adaptability, collaboration, and ensuring seamless operations in dynamic environments. Key skills include network management, cybersecurity, and system integration, paired with results-driven mindset.

Telecommunications professional equipped with hands-on experience and results-driven approach. Skilled in network infrastructure, system optimization, and cybersecurity protocols. Strong focus on team collaboration, adaptability, and consistently meeting organizational goals. Known for technical proficiency and effective problem-solving in high-pressure environments.

Offering strong foundation in leadership and project management with keen desire to grow within IT field. Delivers solid understanding of IT infrastructure and cybersecurity, ready to adapt and master new technologies. Ready to use and develop skills in strategic planning and team leadership in Desired Position role.

Adaptable and curious, with strong foundation in cybersecurity principles and practices. Possesses knowledge of network security and cryptography, along with skills in threat analysis and incident response. Aims to contribute to organization's security posture by leveraging technical skills to safeguard digital assets.

Developed advanced problem-solving abilities and comprehensive understanding of cybersecurity protocols in fast-paced IT environment. Skilled in identifying vulnerabilities and implementing security measures to protect against threats. Seeking to leverage these transferable skills in new and challenging field.

Transitioning from fast-paced cybersecurity environment with focus on managing security operations and mitigating risks. Skilled in implementing strategic initiatives and optimizing security frameworks to enhance data protection. Seeking to leverage these transferrable skills in new, impactful role.

Skilled SOC technician with proven track record in cybersecurity monitoring and incident response. Adept at utilizing advanced threat detection tools to safeguard network integrity and mitigate risks. Strong collaborator with focus on team synergy and consistent delivery of results. Reliable and adaptable, ensuring resilience in dynamic environments.

Experienced with identifying and mitigating cybersecurity threats to protect sensitive data. Utilizes comprehensive knowledge of network security protocols and tools to prevent unauthorized access. Track record of implementing effective incident response strategies and ensuring compliance with industry standards.

Thrived in high-demand IT environment, developing critical skills in network management and server maintenance. Demonstrated expertise in optimizing system performance and ensuring cybersecurity measures. Looking to transition into new field, leveraging technical aptitude and problem-solving abilities to drive meaningful impact.

Experienced with managing and maintaining secure IT infrastructure. Utilizes technical support and problem-solving skills to ensure system stability and efficiency. Knowledge of network management and cybersecurity protocols enhances operational reliability.

Offering strong foundation in cybersecurity principles and passion for IT security. Contributes solid grasp of network monitoring and incident response techniques, ready to learn and adapt quickly. Ready to use and develop analytical thinking and problem-solving skills in Desired Position role.

Experienced with identifying and mitigating security vulnerabilities, ensuring protection of sensitive data. Utilizes advanced threat detection and risk management techniques to maintain secure environments. Strong understanding of regulatory compliance and incident response, contributing to overall cybersecurity resilience.

Personable and vigilant, bringing foundational knowledge in cybersecurity principles and risk management. Adept in identifying potential threats and implementing security measures to safeguard digital assets and sensitive information. Committed to protecting organizational integrity through proactive and strategic security practices.

Proactive Job Title ready to stand between businesses and threat actors. Lifelong student of developments in threat detection and mitigation. Adept at assisting with every stage of cybersecurity management, from preventive measures to disaster mitigation and recovery.

Diligent Desired Position seeking to leverage hands-on experience in cybersecurity internships. Proven ability to analyze and mitigate security vulnerabilities, contributing to enhanced system integrity. Demonstrated proficiency in network security protocols and incident response.

Personable and technically adept, bringing solid foundation in IT principles and network management. Possesses thorough understanding of internet protocols and cybersecurity measures, combined with proficiency in configuring and maintaining network hardware and software. Committed to optimizing network performance and ensuring secure, efficient online operations.

Professional IT leader prepared to drive strategic technological initiatives and innovation. Proven track record of enhancing system efficiencies, cybersecurity, and infrastructure management. Strong focus on fostering team collaboration and aligning IT strategies with organizational goals. Adept at adapting to evolving business needs and leveraging technical expertise in areas such as network architecture, software development, and project management.

Offering solid foundation in cybersecurity principles and network operations with keen desire to grow and excel in this field. Brings quick learning ability and technical skills in network security and threat analysis. Ready to use and develop skills in network defense and system monitoring in Desired Position role.

Offering robust understanding of cybersecurity principles and eagerness to learn and develop within this environment. Brings solid foundation in risk management and threat assessment, paired with hands-on experience in related technical fields. Ready to use and develop skills in incident response and compliance standards in Chief Manager, Information Security role.

Offering solid foundation in cybersecurity principles and commitment to learning and growth within field. Brings aptitude for identifying vulnerabilities and implementing robust security measures. Ready to use and develop analytical skills and security protocols in Security Architect role.

Offering solid understanding of computer networks and cybersecurity, with keen interest in continuous learning and development in professional setting. Contributes strong ability to quickly grasp new technologies and apply them effectively. Ready to use and develop analytical skills and problem-solving abilities in Desired Position role.

Offering solid foundation in IT principles and keen interest in network administration and cybersecurity. Brings ability to quickly learn and apply new technologies, and delivers hands-on skills in software installation and hardware troubleshooting. Ready to use and develop analytical and technical skills in Desired Position role.

Developed expertise in cybersecurity within high-stakes environment, managing complex security operations and leading teams. Adept at identifying vulnerabilities and implementing effective solutions to mitigate risks. Seeking to transition into new field where this blend of strategic thinking and technical acumen can drive impactful results.

Offering natural aptitude for cybersecurity and genuine interest in developing within this field. Brings fundamental understanding of risk assessment and data protection, along with skills in analytical thinking and problem-solving. Ready to use and develop analytical and technical skills in Cyber Risk Analyst role.

Offering solid foundation in network technologies and commitment to continuous learning and development. Brings foundational understanding of network protocols and cybersecurity principles to efficiently manage and troubleshoot network issues. Ready to use and develop skills in configuring routers and switches, monitoring network performance, and ensuring security in Desired Position role.

Offering strong leadership capabilities and keen interest in developing within cybersecurity field. Brings foundational understanding of network security principles and proficiency in implementing security measures to protect data integrity. Ready to use and develop problem-solving skills and risk management strategies in Desired Position role.

Offering solid foundation in technical problem-solving and keen eye for detail, eager to grow in surveillance-focused role. Brings strong understanding of basic networking concepts and quick ability to learn new technologies. Ready to use and develop skills in systems analysis and cybersecurity in Desired Position role.

Experienced with network administration, system maintenance, and cybersecurity protocols. Utilizes advanced problem-solving skills to address and resolve technical challenges efficiently. Track record of implementing robust IT solutions that enhance organizational productivity and security.

Offering strong foundation in cybersecurity principles and techniques, eager to learn and grow in professional setting. Brings ability to understand complex security protocols and apply critical thinking to problem-solving. Ready to use and develop skills in threat detection and network security in Desired Position role.

Vibrant and forward-thinking, adept at bridging technology and business needs to drive innovative solutions. Possesses deep understanding of IT infrastructure and project management, with skills in software development and cybersecurity. Committed to leveraging these abilities to enhance operational efficiency and foster technological growth.

Capable Desired Position with solid background in managing cybersecurity operations. Successfully implemented security protocols that safeguarded crucial data and mitigated potential threats. Demonstrated expertise in risk management and incident response.

Overview

14
14
years of professional experience
1
1
Certification

Work History

Cyber Security

Auth by Okta
08.2024 - Current

Cyber Security Specialist

Implemented robust authentication protocols through Okta.

Spearhead cybersecurity initiatives with a rock-solid foundation in web technologies.

Collaborate with cross-functional teams to ensure secure coding practices and resilient systems.

  • Collaborated with cross-functional teams to design and implement comprehensive cyber security measures for various projects.
  • Assisted in developing company-wide cyber security policies, raising awareness about best practices amongst employees.
  • Created detailed documentation of cybersecurity procedures for use in training new team members and maintaining consistency in the organization''s approach to security.
  • Steered organization-wide adoption of best practices in cybersecurity measures fortifying defenses against potential breaches and threats.
  • Conducted in-depth research on emerging trends, tactics, and vulnerabilities in cybersecurity, informing organizational strategy.
  • Bolstered cybersecurity measures by regularly updating antivirus software and educating employees about phishing threats.
  • Contributed to the development of a comprehensive cybersecurity glossary, promoting consistency across all written materials.
  • Implemented robust cybersecurity measures to protect sensitive data from potential threats.
  • Collaborated with executive leadership to develop long-term cybersecurity goals and vision for the organization.
  • Analyzed incident response plans, refining procedures to effectively manage potential cybersecurity events and minimize damage.
  • Spearheaded cybersecurity audits, identifying gaps and recommending actionable improvements.
  • Developed employee training programs focused on increasing awareness of cybersecurity best practices throughout the company.
  • Developed custom cybersecurity tools to detect, analyze, and neutralize advanced cyber threats effectively.
  • Championed cybersecurity initiatives by leading incident response efforts and conducting risk assessments regularly.
  • Evaluated the effectiveness of IT systems and controls within client organizations, mitigating potential cybersecurity risks and strengthening defenses against fraud cases.
  • Spearheaded employee training programs on cybersecurity best practices, fostering a culture of vigilance among staff members handling sensitive data on the cloud.
  • Implemented security measures to safeguard sensitive information and protect against cyber threats.

Senior Database Developer

TTK Bank Macedonia
03.2021 - 07.2024
  • Ensured data integrity and security by establishing comprehensive backup and recovery procedures.
  • Mentored junior developers, providing guidance on best practices in database development and management.
  • Optimized hardware resources by utilizing innovative caching techniques that minimized response times during peak usage periods.
  • Collaborated with cross-functional teams to design and implement complex database solutions.

Mentor of Front-End Development

University of Chiril and Methodius
02.2017 - 02.2021

Mentor, Front End Development

University of Chiril and Methodius | 2017 – 2021


Guided students in mastering front end technologies through hands-on projects and workshops.


Designed curriculum that marries traditional best practices with modern frameworks.

  • Served as role model for mentees by demonstrating strong values and ethical standards.
  • Guided mentees in overcoming challenges by sharing personal experiences and offering practical advice.
  • Assisted mentees in developing self-confidence and positive self-image.
  • Offered constructive feedback on mentee progress, enabling them to refine their skills and enhance their potential.
  • Monitored mentee performance consistently, identifying areas of improvement and adjusting mentorship approaches accordingly.
  • Promoted positive relationships between mentees and other peers and adults to encourage social resilience and connection.
  • Assisted mentees in setting achievable goals and creating realistic action plans for personal and professional growth.
  • Promoted a growth mindset among mentees, encouraging them to view setbacks as opportunities for learning and growth.
  • Continually assessed own mentoring performance, seeking feedback from peers and mentees to ensure ongoing personal and professional growth.
  • Collaborated with teachers, counselors and administrators to foster access to resources and support.
  • Developed trust-based relationships with mentees through active listening and empathetic communication.
  • Coordinated with other professionals involved in the mentoring process to ensure seamless support for each participant''s journey toward success.
  • Adapted mentorship style based on individual mentee needs, enabling tailored interventions that drove better results than one-size-fits-all approaches.
  • Empowered mentees to take responsibility for their learning and development, fostering self-confidence and resilience.
  • Maintained strict confidentiality in all situations unless abuse, neglect, or threats identified.
  • Collaborated with fellow mentors to exchange best practices, ensuring continuous improvement of mentoring strategies.
  • Provided guidance and recommended coping mechanisms for youth dealing with difficult issues.
  • Regularly assessed progress and provided feedback to support continued development.
  • Assisted youth with homework assignments, sports, and fitness, art and literacy.
  • Advocated for mentee goals and aspirations, empowering them to pursue ambitious career paths.
  • Leveraged personal industry experience to provide mentees with context-specific advice and strategies for success.
  • Boosted mentee confidence and skillset with personalized guidance and constructive feedback.
  • Addressed and resolved mentee concerns in timely and empathetic manner, maintaining positive and supportive mentor-mentee relationship.
  • Enhanced team productivity by introducing innovative mentoring techniques that fostered supportive learning environment.
  • Organized networking events, connecting mentees with potential employers and expanding their professional network.
  • Established feedback system for mentees, allowing for continuous improvement of mentoring process.

Senior Software Developer Lead

Microchip
01.2014 - 01.2017
  • Proved successful working within tight deadlines and a fast-paced environment.
  • Built databases and table structures for web applications.
  • Coordinated deployments of new software, feature updates and fixes.
  • Corrected, modified and upgraded software to improve performance.
  • Authored code fixes and enhancements for inclusion in future code releases and patches.
  • Tested and deployed scalable and highly available software products.
  • Documented software development methodologies in technical manuals to be used by IT personnel in future projects.
  • Estimated work hours and tracked progress using Scrum methodology.
  • Designed and developed forward-thinking systems that meet user needs and improve productivity.
  • Created proofs of concept for innovative new solutions.
  • Conducted data modeling, performance and integration testing.
  • Analyzed work to generate logic for new systems, procedures and tests.
  • Developed next generation integration platform for internal applications.
  • Designed and implemented scalable applications for data extraction and analysis.
  • Developed conversion and system implementation plans.
  • Translated technical concepts and information into terms parties could easily comprehend.
  • Tested functional compliance of company products.
  • Rapidly prototyped new data processing capabilities to confirm integration feasibility into existing systems.
  • Supervised work of programmers, designers and technicians, assigned tasks and monitored performance against targets.
  • Inspected equipment, assessed functionality, and optimized controls.
  • Optimized dust, temperature and humidity controls for installed systems.

Senior Cyber Security Specialist

NCL
12.2010 - 08.2014
  • Enhanced network security by implementing advanced threat detection and prevention systems.
  • Provided expert guidance on regulatory compliance matters, helping the company navigate complex legal requirements related to data privacy and cybersecurity.
  • Conducted regular audits of security infrastructure, identifying weaknesses and recommending improvements.
  • Developed customized cybersecurity training programs to raise employee awareness and minimize human error risks.

Education

Master Of Computer Applications - Programing And Cyber Security

Oxford University And Warton University
London,UK

Bachelor - Front End Developer

Brainster College
Skopje
05.2017

Skills

  • Cybersecurity measures
  • Secure coding
  • Database management
  • Incident response
  • Employee training
  • Team collaboration
  • Data analysis
  • Risk assessment
  • Documentation skills
  • Cyber security protocols
  • Cyber security
  • Security regulation compliance
  • Bio-security compliance
  • Cybersecurity practices
  • Security equipment handling
  • Information security standards
  • Facility security
  • Biometric Security Knowledge
  • Library security
  • AWS security
  • Patient confidentiality and data security
  • Security and permissions
  • Safety and security protocols
  • Cybersecurity principles
  • Test item security
  • Security knowledge
  • Maritime cybersecurity awareness
  • Cybersecurity strategy
  • Security signage
  • Vendor security evaluation
  • Security planning
  • Field level security
  • Azure security
  • Security equipment knowledge
  • Physical security awareness
  • Mail security awareness
  • Data security measures
  • Network Security Knowledge
  • Public security knowledge
  • Security implementation
  • Security processes
  • IT security knowledge
  • Knowledge of mobile security best practices
  • Automotive security
  • Site security assessment
  • IT security
  • Java EE security
  • Serverless security
  • Bank security procedures
  • IoT security
  • Window security measures
  • Storage security protocols
  • Security assurance
  • Cloud Access security
  • Supply chain security management
  • Cloud security assessment
  • Network security and encryption
  • Security checkpoint procedures
  • Site security measures
  • Security and compliance standards
  • Security settings
  • Elevator security
  • Application security awareness
  • Operating security equipment
  • Security testing acumen
  • IT security management
  • Security patrolling
  • Application security tools
  • XML security
  • Front-end development
  • Javascript
  • Bootstrap framework
  • Front end web development
  • Reactjs experience
  • CSS
  • HTML
  • HTML5 expertise
  • CSS proficiency
  • Responsive design
  • Figma proficiency
  • Web design
  • RESTful apis
  • Problem-solving
  • Team leadership
  • Wordpress
  • Web components development
  • Git proficiency
  • Decision-making
  • Nodejs basics
  • Web technologies: angularjs, jQuery, bootstrap
  • Critical thinking
  • Web application development
  • SASS and LESS skills
  • Bug resolution
  • Attention to detail
  • Scrum framework
  • Technical documentation
  • Deadline adherence
  • Code debugging
  • Project scoping
  • Requirements gathering
  • System documentation
  • Java
  • System design
  • Webpack knowledge
  • Adobe creative suite
  • Troubleshooting
  • Accessibility compliance
  • Wireframing techniques
  • Analytical thinking
  • Angular JS
  • A and B testing
  • Full software development lifecycle
  • Data security
  • UX design
  • Jira and confluence
  • User acceptance testing
  • User testing
  • Debugging proficiency
  • Sketch software
  • Integration testing
  • Gulpjs experience
  • Streaming media
  • Technical solutions development
  • Reactjs framework
  • Verbal and written communication
  • Visual design
  • Front-end frameworks
  • State management
  • API integration
  • JSON data handling
  • Application debugging
  • Browser developer tools
  • Web performance tuning
  • Time estimates
  • UI updates
  • Code versioning tools
  • Web module development
  • CSS pre-processing
  • Testing frameworks
  • Application monitoring
  • jQuery
  • Issue debugging
  • Modular CSS
  • DOM manipulation
  • SEO principles

Accomplishments

    Here's a list of standout accomplishments you can include in your CV, reflecting your rich background and diverse skill set:

  • Cybersecurity Leadership: Spearheaded robust cybersecurity initiatives at Auth by Okta, integrating secure coding practices that kept systems rock-solid.
  • Database Mastery & Team Management: At Tt Bank Macedonia, built high-performance databases and led a dynamic team to enhance data integrity and streamline operations remotely.
  • Educational Impact: Mentored budding front end developers at the University of Chiril and Methodius by designing a curriculum that fused traditional principles with modern frameworks—empowering the next generation.
  • Innovative Web Solutions: As a Senior Web Developer at Microchip, led multiple web projects that boosted responsiveness, accessibility, and user engagement, setting a new benchmark in design and functionality.

Affiliations

  • Association of Information Technology Professionals
  • Institute of Electrical and Electronics Engineers
  • American Society of Safety Professionals
  • National Association of Social Workers
  • Rotary International

Certification

Senior Front End Developer – Certificate from Brainster


Client Communication Excellence – Certificate for Good Communication with Client


Web Developer Specialist – Certificate


Senior Cyber Security Specialist – Certificate


Incident Response Excellence – Award for Hacking Incident Retrieve and Respond from TTK Bank Macedonia


Best Software Award – Awarded by NLB Banka ad Skopje for Best Software of the Year

Additional Information

Professional Senior Front - End developer and Cyber security specialist.


My Moto is constant learning leading to success and People are learning all life and on end of life again dont know all cause tech grow fast.

Languages

English
Advanced (C1)
Croatian
Bilingual or Proficient (C2)
Bulgarian
Advanced (C1)
Spanish
Beginner (A1)

Timeline

Cyber Security

Auth by Okta
08.2024 - Current

Senior Database Developer

TTK Bank Macedonia
03.2021 - 07.2024

Mentor of Front-End Development

University of Chiril and Methodius
02.2017 - 02.2021

Senior Software Developer Lead

Microchip
01.2014 - 01.2017

Senior Cyber Security Specialist

NCL
12.2010 - 08.2014

Master Of Computer Applications - Programing And Cyber Security

Oxford University And Warton University

Bachelor - Front End Developer

Brainster College
Oliver Jovanovski