RAVIV
RACHMIEL

I am a Reverse Engineerer Developer Malware Analyst Researcher

ABOUT ME

IN SHORT

Eager to find ways to generate value using my cybersecurity technological, management and entrepreneurial skills which I have acquired during my experience as a group leader and other positions in the IDF in the field of cybersecurity for 7 years, alongside my academic degrees and expertise in the field of Malware Research and Reverse Engineering.

I am a hard worker, passionate and highly motivated, in a constant search for learning new things; Looking for opportunities to expand my subject of knowledge and achieve great accomplishments.

My main mission is to safeguard your networks with unparalleled security solutions while maintaining my number one value - committing to an open and transparent communication with all my clients with a professional yet comprehensive and thorough approach, done with full discretion.

EDUCATION

I studied for 4 years a BSC in Software Engineering, under the faculty of Computer Science at the Technion IIT.

Later, studied an MBA in Technology, Innovation & Entrepreneurship (“MOTIE”) at the Tel Aviv University and student exchange in George Washington University.

WORK EXPERIENCE

Head of a Cybersecurity R&D group2022-2024

Cyber Researching Team Lead –2020-2022

Cyber Security Researcher – 2018-2020

Teaching Assitant at the Technion – 2015 – 2017

send me the full resume

SERVICES

Let’s see what I can do for you

malware research

Our in-depth malware research service delivers comprehensive reports detailing the capabilities of various malware strains. Each report includes a details explanation of the full capabilities of the malware, including

– Communication Protocols: 

Understanding how malware communicates is crucial for effective mitigation.

– Persistence Methods: 

We analyze how malware maintains its presence on infected systems.

– Command and Control (C&C): 

We detail the infrastructure used by malware operators and the commands implemented by the malware including an emulation of the C&C

– Lateral movement: 

A detailed explanation about techniques used to progressively move through a network including related files and the initial infection if there is an IOC regarding it.

– Indicators of Compromise (IOCs): 

We provide actionable IOCs for detection and prevention.

Additional Outputs:

We develop custom detection signatures (Yara, Snort, Suricata, Sigma) to enhance your security posture. Additionally, we provide attribution analysis to identify the actors behind the malware.

ir after PT

Incident response after penetration testing is our special technique – we use the outcomes of the PT reports to conduct an IR operation in order to find malicious activity in your networks

Our penetration testing and incident response services ensure that your organization is prepared for and can effectively respond to cyber threats including to finding major threats and actors inside your networks. We offer:

– Real-World Attack Simulations:

Test your defenses against simulated attacks in various fields emerging from:

Red Team Operations such as:

Ethical Hacking, MITRE ATT&CK, Active Directory, Assessment, Exploit Development, Operations, Software Development, Phishing & Social Engineering Simulation, CobaltStrike, Covenant, impacket, Self developed tools and scripts, Metasploit, Anonymization Technologies

Penetration Tests:

External Assessments, Company OSINT Reconnaissance, Dark Web OSINT, Asset Discovery, Web Application, Network, System, Infrastructure testing, White box testing, Black Box Testing, API Testing, IoT Security Testing, Vulnerability Assessment, Website Security, OWASP

– Incident Response Planning:

Develop and implement effective incident response strategies.

Training and courses in defensive CyberSecurity, Reverse Engineering and Malware Research

We offer customized training programs tailored to your organization’s needs:

– Custom Syllabus Development: 

We create a syllabus that aligns with your team’s skill levels and objectives.

– Master Classes: 

Our expert instructors deliver engaging master classes that equip your team with the knowledge and skills needed to excel in reverse engineering, malware research and various more defensive cyber security subjects.

cybersecurity consultancy

Our consultancy services are designed to help organizations navigate the complex cybersecurity landscape. We provide:

Risk Assessments
  • Identify vulnerabilities and develop strategies to mitigate risks.

Policy Development
  • Craft robust cybersecurity policies tailored to your organization’s needs according to Compliances.
code on screen

reverse engineering

Our reverse engineering service allows you to gain critical insights into any binary, from EXE to APK. We provide In-Depth Analysis Reports – Understand the capabilities and functionalities of the binary, empowering you to make informed decisions about security and compliance.

not sure?

company tailor-made solutions

Let’s talk about your specific needs.

contact

Skip to content