ABOUT ME
IN SHORT
Eager to find ways to generate value using my cybersecurity technological, management and entrepreneurial skills which I have acquired during my experience as a group leader and other positions in the IDF in the field of cybersecurity for 7 years, alongside my academic degrees and expertise in the field of Malware Research and Reverse Engineering.
I am a hard worker, passionate and highly motivated, in a constant search for learning new things; Looking for opportunities to expand my subject of knowledge and achieve great accomplishments.
My main mission is to safeguard your networks with unparalleled security solutions while maintaining my number one value - committing to an open and transparent communication with all my clients with a professional yet comprehensive and thorough approach, done with full discretion.
EDUCATION
I studied for 4 years a BSC in Software Engineering, under the faculty of Computer Science at the Technion IIT.
Later, studied an MBA in Technology, Innovation & Entrepreneurship (“MOTIE”) at the Tel Aviv University and student exchange in George Washington University.
WORK EXPERIENCE
Head of a Cybersecurity R&D group – 2022-2024
Cyber Researching Team Lead –2020-2022
Cyber Security Researcher – 2018-2020
Teaching Assitant at the Technion – 2015 – 2017
send me the full resume
SERVICES
Let’s see what I can do for you
malware research
Our in-depth malware research service delivers comprehensive reports detailing the capabilities of various malware strains. Each report includes a details explanation of the full capabilities of the malware, including
– Communication Protocols:
Understanding how malware communicates is crucial for effective mitigation.
– Persistence Methods:
We analyze how malware maintains its presence on infected systems.
– Command and Control (C&C):
We detail the infrastructure used by malware operators and the commands implemented by the malware including an emulation of the C&C
– Lateral movement:
A detailed explanation about techniques used to progressively move through a network including related files and the initial infection if there is an IOC regarding it.
– Indicators of Compromise (IOCs):
We provide actionable IOCs for detection and prevention.
Additional Outputs:
We develop custom detection signatures (Yara, Snort, Suricata, Sigma) to enhance your security posture. Additionally, we provide attribution analysis to identify the actors behind the malware.
ir after PT
Incident response after penetration testing is our special technique – we use the outcomes of the PT reports to conduct an IR operation in order to find malicious activity in your networks
Our penetration testing and incident response services ensure that your organization is prepared for and can effectively respond to cyber threats including to finding major threats and actors inside your networks. We offer:
– Real-World Attack Simulations:
Test your defenses against simulated attacks in various fields emerging from:
Red Team Operations such as:
Ethical Hacking, MITRE ATT&CK, Active Directory, Assessment, Exploit Development, Operations, Software Development, Phishing & Social Engineering Simulation, CobaltStrike, Covenant, impacket, Self developed tools and scripts, Metasploit, Anonymization Technologies
Penetration Tests:
External Assessments, Company OSINT Reconnaissance, Dark Web OSINT, Asset Discovery, Web Application, Network, System, Infrastructure testing, White box testing, Black Box Testing, API Testing, IoT Security Testing, Vulnerability Assessment, Website Security, OWASP
– Incident Response Planning:
Develop and implement effective incident response strategies.
Training and courses in defensive CyberSecurity, Reverse Engineering and Malware Research
We offer customized training programs tailored to your organization’s needs:
– Custom Syllabus Development:
We create a syllabus that aligns with your team’s skill levels and objectives.
– Master Classes:
Our expert instructors deliver engaging master classes that equip your team with the knowledge and skills needed to excel in reverse engineering, malware research and various more defensive cyber security subjects.
cybersecurity consultancy
Our consultancy services are designed to help organizations navigate the complex cybersecurity landscape. We provide:
Risk Assessments
Identify vulnerabilities and develop strategies to mitigate risks.
Policy Development
- Craft robust cybersecurity policies tailored to your organization’s needs according to Compliances.
reverse engineering
Our reverse engineering service allows you to gain critical insights into any binary, from EXE to APK. We provide In-Depth Analysis Reports – Understand the capabilities and functionalities of the binary, empowering you to make informed decisions about security and compliance.