Antonio Maci
Cyber Security Software Specialist (R&D) at BV TECH Group- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
Inglese Professional working proficiency
-
Italiano Native or bilingual proficiency
Topline Score
Bio
Credentials
-
Microsoft Office Specialist (MOS) Master
MicrosoftFeb, 2016- Nov, 2024 -
Certified Ethical Hacker (CEH)
EC-CouncilAug, 2022- Nov, 2024
Experience
-
BV TECH
-
Italy
-
IT Services and IT Consulting
-
300 - 400 Employee
-
Cyber Security Software Specialist (R&D)
-
Mar 2020 - Present
As a Cyber Security Software Specialist and Researcher I'm working for a R&D project with the main goal to introduce innovative filtering strategies to enhance an innovative Next-Generation Firewall (NGFW) prototype. During this period, my primary research activities can be summarized as follows: 1) The implementation of an innovative algorithm aimed at optimizing FW rule ordering, having the goal to minimize the packet classification latency. The proposed algorithm is based on some heuristics such as Genetic Algorithm. 2) The implementation of an automatic generation process for Suricata (a network-based IDPS engine) rules generation based on an interpretable Machine Learning model, that is a Decision Tree, which is tuned on the basis of the produced ruleset optimality to generate the optimal one, in the sense of high number of intercepted anomalies and small number of rules produced. 3) The implementation of Yara-byte signatures Metamorphic Engine, aimed at enhancing Yara rules in order to improve AV capabilities in discovering metamorphic malware.4) The proposal of a Deep Reinforcement Learning-based approach to tackle the web phishing detection problem, i.e., an imbalanced classification problem.5) The proposal of a case study addresses by means of a Q-Learning-based agent to discover Safety-Critical States in simulated OT scenarios, such as Smart Grid.6) A systematic review on several state-of-the-art Machine Learning algorithms, applied to different cyber threats detection problems, such as: 1) Malware Detection (performed an evaluation of Shallow and Deep Learning algorithms); 2) Phishing Detection (performed an evaluation of Boosting and Deep Learning algorithms); 3) DoS/DDoS Detection (performed an evaluation of Shallow Learning algorithms).7) The realisation of scientific articles leading to the papers listed in the below "Publications" section. Show less
-
-
Cyber Security Analyst (SOC)
-
Jun 2019 - Feb 2020
As Cyber Securty Analyst I performed in-depth analysis of security incidents occured on the Customer's network infrastructure. In particular, I worked for the aerospace and financial industries. Furthermore, I performed some developer activies, such as the implementation of: 1) SIEM correlation rules aimed at aggregating one (or more) security alert(s) triggered by security network devices such as IDS or IPS, in order to create a specific security incident; 2) Implementation and analysis of monitoring rules aimed at generating statistical reports such as dashlets, dashboards and dynamic and interactive charts. The list of tools employed during such an experience is the following: RSA Netwitness / IBM QRadar (SIEM), Trend Micro Deep Discovery Inspector (IDS) / Deep Discovery Director (IDS Concentrator); Qualys for Vulnerability Assesment purposes. Show less
-
-
Education
-
Politecnico di Bari
Master's degree, Automation Engineering (Cyber Physical System), Ingegneria dell'Automazione -
Politecnico di Bari
Bachelor's degree, Computer and Automation Engineering, Ingegneria Informatica e dell'Automazione