Role: Update & Infrastructure team - mentored & lead software engineering team.
Designed & streamlined existing Perl framework migration to Python, deprecating all legacy code and increasing code quality & execution efficency.
Rearchitectured & implemented a service meant to reduce the number of overlapping detection signatures. As a result, memory usage decreased by 25% for Bitdefender light products which allowed integration in custom designed WiFi systems that increased company industry footprint.
Contributed heavily to the recruitment process across several teams in order to hire the best.
------------------------------------------------------------------------------------------------------------------------------------------------------------
Role: Exploits team - resolved critical challenges regarding exploitation chains & targeted live attacks on customers.
Investigated usage of in-memory execution, privilege escalation, code obfuscation & 0-day vulnerabilities to bypass antivirus security. Research results enabled specialized teams to develop heuristics aimed at improving detection footprint & provided groundwork for developing the new Bitdefender EDR system.
Developed several tools for monitoring social-media cybersecurity news in order to trigger alerts on new exploit kit developments by malicious actors.
------------------------------------------------------------------------------------------------------------------------------------------------------------
Role: Adware & PUA (Possible Unwanted Applications) team - troubleshooted & documented new clusterization methods.
Responsible for developing a clusterization framework to correctly map 100+ families of unwanted software. Created custom heuristics resulting in detection coverage ranging from 80% to 100% per targeted family.
------------------------------------------------------------------------------------------------------------------------------------------------------------
Technologies: C / C++, Python, Ruby, Perl, Docker, Win32 API, Kali Linux, Metasploit (penetration testing), IDA Pro (disassembler), OllyDbg (debugger emphasizing binary code analysis), PeStudio/HexRays (static malware analysis), Process Dump, VB Decompiler, ILSpy, Wireshark, VirtualBox, VMWare.