KELA
Doron Makmel is a skilled software engineer with extensive experience in backend development and microservices architecture. Currently at KELA since November 2021, Doron specializes in initializing core microservices using C#, TypeScript, and Node. Prior to this role, Doron designed and implemented authentication and authorization microservices at Stealth, employing technologies such as Python, TypeScript, and Azure. At Bitdam, Doron led infrastructure design efforts as a Cloud Engineer, developing asynchronous Python microservices and managing deployments in Azure Cloud. Doron's earlier roles include Development Team Lead in the IDF, where oversight of high-impact solutions in the cyber military industry was paramount, and a Full Stack Engineer. Doron holds a Bachelor of Science in Computer Science from The Open University of Israel and previously studied at ORT Colleges.
This person is not in any offices
KELA
2 followers
KELA is an award-winning cybercrime threat intelligence firm that aims to provide 100% actionable intelligence on threats emerging from the cybercrime underground. With proprietary automated technologies and qualified intelligence experts, the company provides unique, contextualized, and actionable insights into cybercrime threats by using its cybercrime threat intelligence and cybercrime attack surface intelligence technology. KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet. It's the only platform to combine cybercrimee threat intelligence and cybercrime attack surface intelligence. The platform: - Cybercrime Investigations: Leverage the power of KELA's cybercrime security data lake to investigate and analyze cybercrime threats anonymously and in real-time. - Cybercrime Attack Surface Intelligence: Discover and identify your external attack surface as seen from the eyes of attackers by monitoring cybercrime sources for essential organization assets. - Risk Assessment, Integration, and Dissemination: Integrate into your security stack and reduce your attack surface with threat alerts, real-time measurement of risk, and tailored Recommendations for mitigation.