• Cyber Security Lead

    at Darkmatter

    July 2017 - at Present

    Abū Z̧aby

    • Leading Cyber Security Assurance initiatives for Cyber Security systems • Involved in defining project requirements, and monitoring these across the project intermediary milestones to ensure compliance with the contract • Ability to read contracts and interpret information security contractual requirements • Generating reports and Information Security Metrics to track cyber security projects • Managing vendor deliverables to ensure compliance and a high degree of quality • Penetration Testing • Network Security • Application Security • Information Security • Vulnerability Assessment • Threat assessment • Cyber Threat Intelligence • Advanced knowledge on security assessment tools (Kali Linux, Metasploit, Nessus) • Scripting (Python, PowerShell, Bash, SQL) • Red Teaming • Knowledge on adversary models: Lockheed Martin Cyber Kill Chain, and MITRE adversary tactics, techniques & common knowledge (ATT&CK) matrix • Incident Management and Response

  • Senior Cyber Security Engineer / Cyber Quality Assurance Lead

    at Permadeal Limited

    March 2015 - June 2017

    Abū Z̧aby

    • Driving quality assurance for Cyber Security systems at customer site at implementation stage. • Applying secure design principles to network architecture involving knowledge of packet data, ISP networks, IP protocols and segmentation. • Configuring Email Security appliances to offer detection against spam, phishing and malware. • Simulating cyber-attacks by creating packet captures for cyber testing, which exercise DDoS, malware, spam, phishing and exploit attacks. • Designing Assessments, Test Strategies and Test Plans for cyber security components, both hardware and software. • Analyzing and reporting test outputs from both manual tests and automated regression runs. • Applying change management processes: versioning, Baselining, security impact analysis, all as part of development, customer deployment and Operation & Maintenance • Following Agile development methodology and change management during the security software development lifecycle.

  • Ixia

    at Technical QA Manager/Technical Lead

    April 2010 - February 2015


    • Managing the testing efforts for Network Impairment and Test Emulation products, which offer Timing, Synchronization and Network Impairment testing solutions required by next generation carrier grade Ethernet/IP based networks. • Managing the testing effort for the new hardware load modules introduced in Ixia’s networking test solutions, ensuring coverage on MSD API, TCL API, manufacturing scripts, hardware testing (Loop, Soak, Acceptance, Integration, Cable, Thermal testing, prototype and manufacturing evalboards validation). • Security Quality Assurance for BreakingPoint testing software with focus on Application layer attack types (using DNS flood and Recursive GET Floods). • Designing Assessments and Test Strategies for newly developed features. Test Strategies would form the baseline for developing the Test Plans, which assured that the proper functionality and security requirements were validated.

  • Lead Technical Engineer

    at CGS

    July 2008 - March 2010


    • Offering technical assistance for IBM products, both hardware (laptops, desktops, servers, RAID, redundancy, complex hardware architectures) and for the operating system and software running on the machines, to support agents which dealt directly with customers. • Driving the resolution of technical escalations in order to meet the advertised SLA. • Sustaining software/hardware trainings for front office agents and coordination of onsite engineer teams

  • Technical Support Engineer

    at Sonicwall

    July 2007 - July 2008


    • Assisting customers with the deployment of Sonicwall network security solutions: UTM firewall appliances, Site to site VPNs & SSL-VPNs systems, Antivirus software for Desktop/Server/Network, Backup, Monitoring, Network Traffic Filtering, Intrusion Detection/Prevention, Email Security. • Working with applied cryptography by configuring Site-to-Site VPNs and SSL VPNs. • Site-to-Site VPN configurations with IPSec, symmetric (DES, 3DES, AES) and asymmetric (Diffie Hellman, RSA) protocols. • Using Public Key Infrastructure and Digital signatures. • Secure network architecture design for IP protocols by configuring segmentation. • Configuring firewalls/UTM (Unified Threat Management) solutions to generate DMZs to protect internal assets, bastion hosts, screened subnets. • Firewalls deployment architecture as single tier, two tier and three tier. • Securing network components by utilizing UTMs (Unified Threat Management)/firewalls for traffic inspection and filtering.


  • Offensive Security Certified Professional (OSCP)

    at Offensive Security

    2019 - at Present (1 year) București

  • GIAC Penetration Tester (GPEN)

    at SANS

    2018 - at Present (2 years) București

  • Certified Information Systems Security Professional CISSP

    at ISC2

    2017 - at Present (3 years) București

  • Certified Ethical Hacker CEHv9

    at EC-Council

    2016 - at Present (4 years) București

  • Cisco Certified Network Professional Routing and Switching CCNP

    at Cisco

    2013 - at Present (7 years) București

  • Cisco Certified Network Associate Routing & Switching CCNA 640-802

    at Cisco

    2009 - at Present (11 years) București

  • Certified Sonicwall Security Administrator CSSA

    at Sonicwall

    2007 - at Present (13 years) București

  • Master of Engineering

    at Polytechnic University of Bucharest

    2004 - 2009 (5 years) București


  • English Negotiation

  • Romanian Native