# Petr Khromov > Investigative Computer Scientist curious and skilled in Python: Computer Vision, Iot, Automation, Security. Location: Santa Clara, California, United States Profile: https://flows.cv/petrkhromov I am a computer scientist who is interested in electrical engineering, IoT, developing, and futuristic technologies. As former military, I know how to get a project done, stay on a focused timeline, and commit to performing under budget. My track record demonstrates that I possess the skills to learn difficult information within a short period of time and apply new concepts, in practice, to complex problems. I care that the team is successful and that we get stuff done in a collaborative environment. My projects (totaling four large projects, two smaller, and various events, to name a few) speak of my knowledge, skills, and abilities (KSAs) in my field. If you would like to network with me or if you have employment opportunities, I would like to discuss many of the key performance indicators (KPIs) that demonstrate I'm a good match for your project and business enterprise. Please contact me at: ptrkhromov@gmail.com ## Work Experience ### Senior Software Engineer @ Picarro Jan 2023 – Present ### Software Engineer @ Picarro Jan 2018 – Jan 2025 | Santa Clara ### Software QA Engineer Intern @ Peaxy, Inc. Jan 2017 – Jan 2018 | San jose - Designed and conducted several test plans on user/roles access system privileges and client security - Performed source code audit in Java and JavaScript to reduce REST API URIs total by 85% - Created automated tests on Python such as unit tests and regression tests - Utilized Jira to file bugs discovered by system, black box and stress testing on networked clusters - Conducted a security analysis and ensured client to cluster communication using filesystem in user-space (FUSE) followed proper encryption protocols(PKI standards, Kerberos) and ensured dynamic configuration switching - Discovered critical user access permission vulnerability via testing - Penetration testing: unauthorized access testing, code injection, certificate substitution. - Researched the Unix signal system to make sure that a signal is sent through fuse appropriately - Worked in a team of 3 to prototype a RaspberryPi intermediate bastion server connected to an isolated license issuing server designed to allow a user to automate generation of licenses via UI or API ### Software Engineering Intern @ Bromium Jan 2016 – Jan 2016 | Cupertino My experience includes analyzing the product for false-positive solutions. The forensics part of the product I worked on detects malicious activity within web pages and documents accessed via the company's product. Using a Python engine that analyses the forensics traces and works out if they're real problems or false-positives, I worked through each of the patterns within its analysis and determined whether we had a plan for avoiding these false positives. I worked on enhancements for a threat analysis dashboard and scripts. I used a Python engine that had a web UI and made improvements. I made a display of all events, which involved command-line scripts. After becoming familiar with the customer-facing service, I moved some of the 'threat analysis dashboard' intelligence into the company's cloud service. I worked to improve the display of the threat intelligence within the product's UI, making sure the threat intelligence display would change in the local UI using an HTML5 & SVG web control. ## Education ### Bachelor's degree in Computer Science San José State University ### Associate of Science (AS) in Mathematics Foothill College ### Associate of Science (A.S.) in Computer Science Foothill College ## Contact & Social - LinkedIn: https://linkedin.com/in/petr-khromov-021b2561 - Website: http://74088.blogspot.com/ --- Source: https://flows.cv/petrkhromov JSON Resume: https://flows.cv/petrkhromov/resume.json Last updated: 2026-04-01