Sectors:
Locations:
Min Investment:
Max Investment:
Target Investment:
CISSP
(2011 - 2011)
B.Sc.
(2007 - 2010)
2023
2023
2018
2018
2017 - 2023
2017 - 2023
2014 - 2017
2014 - 2017
2011 - 2014
2012 - 2014
• Designed and implemented proposals for National Cyber Security centers. • Created tailor-made cyber solutions (both defensive and offensive) for both local and international customers. • Responsible for the pre-sale process, which included both marketing and sales aspects. • Managed the development process for various cutting-edge cyber solutions. • Led the development process of the Cyber Training program for both international customers and national organizations. • Participated in and presented the different cyber solutions at multiple national conferences. • Managed and implemented the Cyber Training system for customers worldwide.
2011 - 2012
• Managed all cyber research activities related to the Chief Scientist of Israel on behalf of the company. • Implemented various cyber solutions with an emphasis on automated systems intended to identify risks and to create imaging of the network's state in real-time (cyber command and control). • Led and established an automated cyber attack solution for training purposes, which included managing the development team and the sub-contractors. • Managed and implemented the Cyber Training system for national customers within the defense industry. • Conducted technology research on various cyber attacks. • Communicated directly with customers at the pre-sale stage. • Planned and designed multiple product information security architectures.
2010 - 2011
2010 - 2011
• Penetration Testing of diverse systems. • Execution of information security risk assessments for global organizations (telecom, finance, government and industry). • Identification and mapping of security needs, and the integration of solutions based on business needs. • Formulation of hardening procedures for systems and products. • Secure architecture design and review. • Threat modeling and in-depth assessments. • Information security policy and procedure formulation. • Network and Wireless Security.
2006 - 2008
2006 - 2008
SDLC Project Management: • Execution of threat assessments for core applications (Design Reviews) • Policy compliance benchmarking for diverse systems, and implementation of controls accordingly • Leading and management of Code Reviews and Penetration Testing projects • Definition of pan-organizational security solutions Infrastructure product reviews in accordance with the information security policy. Planning and design of applications and network architecture. Technological research and definition of SIM/SOC systems. Hardening definitions of infrastructure products (OS, Databases etc.) Disaster Recovery Planning and Design
2003 - 2006
2003 - 2006