Personal Information
Organization / Workplace
Campinas Area, Brazil Brazil
Occupation
Penetration Tester/Security Analyst at Tempest Security Intelligence
Website
codesec.blogspot.com
About
I’m Penetration Tester/Security Analyst at Tempest Security Intelligence. In this role I focused on best practices around application penetration testing, including application vulnerability assessment and source code review, using a combination of static and dynamic analysis to identify vulnerabilities. Strong experience in evaluation, architecture, design, planning, implementation, and support of security solutions.
I’m truly passionate about my work and always eager to connect with others security guys. While I enjoy all aspects of my job, I think my favorite stage of a project is working with the client or business unit leader to understand his or her business objectives. As we go ...
Tags
security
hacking
infosec
conference
information security
nullbytecon
nullbyte
See more
Presentations
(5)Likes
(10)Browsers_SameOriginPolicy_CORS_ContentSecurityPolicy
subbul
•
10 years ago
Web Security - Cookies, Domains and CORS
Perfectial, LLC
•
10 years ago
Misconfigured CORS, Why being secure isn't getting easier. AppSec USA 2016
Evan J Johnson (Not a CISSP)
•
7 years ago
CORS and (in)security
n|u - The Open Security Community
•
10 years ago
BSides Roma 2018 - Red team techniques
Guglielmo Scaiola
•
6 years ago
Red Team Apocalypse
Beau Bullock
•
6 years ago
Carlos García - Pentesting Active Directory [rooted2018]
RootedCON
•
6 years ago
Network tunneling techniques
inbroker
•
8 years ago
Introduction to Python
Nowell Strite
•
13 years ago
Modelagem ameaças para Pentester
Leandro Rocha
•
9 years ago
Personal Information
Organization / Workplace
Campinas Area, Brazil Brazil
Occupation
Penetration Tester/Security Analyst at Tempest Security Intelligence
Website
codesec.blogspot.com
About
I’m Penetration Tester/Security Analyst at Tempest Security Intelligence. In this role I focused on best practices around application penetration testing, including application vulnerability assessment and source code review, using a combination of static and dynamic analysis to identify vulnerabilities. Strong experience in evaluation, architecture, design, planning, implementation, and support of security solutions.
I’m truly passionate about my work and always eager to connect with others security guys. While I enjoy all aspects of my job, I think my favorite stage of a project is working with the client or business unit leader to understand his or her business objectives. As we go ...
Tags
security
hacking
infosec
conference
information security
nullbytecon
nullbyte
See more