
About Me
Professional Story
I began my career as a financial services consultant, working closely with customers and business stakeholders to translate their needs into effective solutions. That early hands-on experience in understanding real business challenges shaped how I approach cybersecurity today: strategic, customer-focused, and impact-oriented.
My path evolved into data science and fraud oriented within the banking sector, where I built machine learning models that helped financial institutions make smarter risk-driven decisions. From that foundation in analytics and fraud detection, I transitioned into cybersecurity research at IBM Security\'s Trusteer Labs. There, I worked with major banks worldwide to analyze cyber-enabled financial crime and mobile fraud, gaining deep insight into adversarial behavior, malware ecosystems, and large-scale fraud patterns.
I later advanced to lead multiple global cyber threat intelligence teams, responsible for generating high-value intelligence from deep/dark web sources, OSINT, and technical telemetry across customer perimeters. This role strengthened my ability to convert complex threat research into actionable outcomes that influence tactical defense and executive strategy.
Today, as Director of Threat Intelligence at Aqua Security, I design and operate a large-scale cloud-native honeypot infrastructure that captures real-world attacks across global environments. I oversee the collection and analysis of threat artifacts, reverse engineer malware, uncover misconfigurations and vulnerabilities in the cloud-native ecosystem, and publish high-impact intelligence that enhances product capabilities and market advantage.
I am passionate about the intersection of advanced research, strategic cybersecurity, and business value — pushing innovation forward while protecting those who rely on modern cloud infrastructure. Through public research, conferences, and industry collaborations, I strive to help organizations anticipate threats rather than react to them.
Expertise Areas
Cloud-Native Security
Threat Intelligence
Malware Analysis
Incident Response
Reverse Engineering
Security Research
Vulnerability Assessment
Attack Attribution