Gal Nachum

Software Engineer at KELA

Gal Nachum is a software engineer at KELA since May 2020, with prior experience as a software developer and team head at Ofek 324 Unit - IAF from December 2013 to January 2019, where leadership in the development of large-scale innovation products was demonstrated. Gal also served as a system administrator, specializing in Tier 3 network administration and technological support in computer networking, virtualization environments, Citrix, SCCM, as well as Windows and Linux systems. Additionally, Gal participated in the FIRST FRC Robotics school project as part of team THE JOKER #4320 from January 2012 to December 2013. Academic qualifications include a Bachelor's degree in Computer Science from The College of Management Academic Studies (2016-2019) and a high school diploma in Computer Science from Amal Bet High School (2011-2013). Proficiencies include Python and various technological and administrative skills.

Links

Previous companies


Org chart

No direct reports

Teams


Offices

This person is not in any offices


KELA

2 followers

KELA is an award-winning cybercrime threat intelligence firm that aims to provide 100% actionable intelligence on threats emerging from the cybercrime underground. With proprietary automated technologies and qualified intelligence experts, the company provides unique, contextualized, and actionable insights into cybercrime threats by using its cybercrime threat intelligence and cybercrime attack surface intelligence technology. KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet. It's the only platform to combine cybercrimee threat intelligence and cybercrime attack surface intelligence. The platform: - Cybercrime Investigations: Leverage the power of KELA's cybercrime security data lake to investigate and analyze cybercrime threats anonymously and in real-time. - Cybercrime Attack Surface Intelligence: Discover and identify your external attack surface as seen from the eyes of attackers by monitoring cybercrime sources for essential organization assets. - Risk Assessment, Integration, and Dissemination: Integrate into your security stack and reduce your attack surface with threat alerts, real-time measurement of risk, and tailored Recommendations for mitigation.


Industries

Employees

51-200

Links