Analyzing cyber attacks and threats and discovering the cause of attacks and finding intruders
Design and implementation of organizational and corporate cloud security processing according to the specific infrastructures of each complex
Analysis of malware, ransomware and internal and external threats that target the systems of an organization
Founder & Manager (CISO)
Advisor and Guide of the team
Economic Consultant
CTO
Cryptographic Analysis Expert
Steganography Analysis Expert
Penetration Testing Expert
Data Scientist