The individual has a Ph.D. in Cybersecurity and programming background , showcasing a unique blend of technical expertise. Their career includes roles in cybersecurity, focusing on penetration testing, vulnerability analysis, and web + mobile application security.
Adept in programming, cloud-based security, and hold advanced cybersecurity certifications. This profile highlights a combination of academic achievement, practical IT security skills, and a track record in cybersecurity leadership.
Represents Poland at Locked Shields international exercise from 2023
Cybersecurity expert specializes in threat hunting, penetration testing, red teaming, and threat research. He’s also the founder of Intel Ops Academy, where he teaches students how to track down APTs, criminal groups, and harmful infrastructure.
Hold advanced cybersecurity certifications. Oxford University Computer Science Graduate
Expert with defensive and offensive cybersecurity background , showcasing a unique blend of technical expertise. Their career includes roles in cybersecurity, focusing on Threat Hunting and Intelligence, Cloud Security, and offensive security exercises inluding red teaming and pentesting.
Hold advanced cybersecurity certifications. This profile highlights a combination of academic achievement, practical IT security skills, and a track record in cybersecurity leadership.
Represents Poland at Locked Shields international exercise from 2023
The individual has defensive and offensive cybersecurity background , showcasing a unique blend of technical expertise. Their career includes roles in cybersecurity, focusing on Threat Hunting and Intelligence, Cloud Security, and offensive security exercises inluding red teaming and pentesting.
Hold advanced cybersecurity certifications. This profile highlights a combination of academic achievement, practical IT security skills, and a track record in cybersecurity leadership.
Incident Responder and Threat Hunter with almost 10 years of expertise in cybersecurity with good understanding for other Blue Team components: SOC, TI, VMS etc.
Practical experience in response to domain-wide breaches for political-motivated Threat Actors (APTs) and financial-motivate groups (Ransomware). Wide knowledge about digital forensics. Large know-how about proactive hunting of Threat Actors presence in corporate environments and building custom detection to fulfill monitoring gaps. His knowledge and expertise confirmed with multiple GIAC certificates.
Cybersecurity expert specializing in detection engineering. With a keen eye for spotting threats, he crafts innovative solutions to safeguard digital ecosystems. His expertise lies in designing detection systems using cutting-edge technologies, ensuring proactive defense against cyber threats.
Fight faster, smarter and enhance your cybersecurity strategy