CYCON Security Ltd.
Oran Galili is an experienced Information Security and Penetration Tester currently working at CYCON Security Ltd. since February 2022 and at INTENSITY Global Group since March 2020. Prior experience includes a role as Information Security and Junior Penetration Tester at IPV Security from May 2019 to March 2020. Oran Galili has expertise in privilege escalation for Windows and Linux, various penetration testing methodologies (Black Box, Gray Box, White Box), wireless network assessment, and database security assessments. Scripting skills include Bash, Python, and PowerShell. Oran Galili holds a Certified Ethical Hacker credential from HackerU, earned between 2018 and 2019, and completed high school at Ramot Hefer from 2006 to 2009.
This person is not in any teams
CYCON Security Ltd.
CYCON Security is a cyber security company that develops an automated IR product that gives the possibility to see the whole story of the attack from the beginning to the end: 1. Intelligence Gathering: How a hacker sees the organization from the outside by collecting intelligence from the Dark Net and attacker's forums to identify leaked user's credentials and confidential information. 2. Endpoints and Servers Investigation: An anomaly investigation in the endpoints/servers to identify suspicious behavior that runs in real-time. The CYCON-IO platform knows how to identify unknown behavior and malicious code on endpoints/servers and gives an indication of the source of the attack. 3. Network communication: Identifying suspicious communication between computers/servers and outgoing and incoming communication. The expertise of the CYCON-IO platform makes it possible to automatically identify and block suspicious communication against malicious IP addresses. Our Experience : Defensive * IR - Incident Response. * Cyber Intelligence. * Vulnerability Assessment. * Cyber Training. Offensive ( Prevetative ) * Tactical Intelligence - Offensive. * Red Team. * Blue Team. * Penetration Testing - Application/ Infrastructure. * Threat Modelling. * Cyber Threat Intelligence ( CTI ) Strategic * Compliance & Regulation. * Proofs Of Concept. * Assess New Technology. * Policy & Procedure Writing. * Remediation Work Plan.