Antonio Maci

Cyber Security Software Specialist (R&D) at BV TECH Group
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Torre Santa Susanna, Apulia, Italy, IT
Languages
  • Inglese Professional working proficiency
  • Italiano Native or bilingual proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Microsoft Office Specialist (MOS) Master
    Microsoft
    Feb, 2016
    - Nov, 2024
  • Certified Ethical Hacker (CEH)
    EC-Council
    Aug, 2022
    - Nov, 2024

Experience

    • Italy
    • IT Services and IT Consulting
    • 300 - 400 Employee
    • Cyber Security Software Specialist (R&D)
      • Mar 2020 - Present

      As a Cyber Security Software Specialist and Researcher I'm working for a R&D project with the main goal to introduce innovative filtering strategies to enhance an innovative Next-Generation Firewall (NGFW) prototype. During this period, my primary research activities can be summarized as follows: 1) The implementation of an innovative algorithm aimed at optimizing FW rule ordering, having the goal to minimize the packet classification latency. The proposed algorithm is based on some heuristics such as Genetic Algorithm. 2) The implementation of an automatic generation process for Suricata (a network-based IDPS engine) rules generation based on an interpretable Machine Learning model, that is a Decision Tree, which is tuned on the basis of the produced ruleset optimality to generate the optimal one, in the sense of high number of intercepted anomalies and small number of rules produced. 3) The implementation of Yara-byte signatures Metamorphic Engine, aimed at enhancing Yara rules in order to improve AV capabilities in discovering metamorphic malware.4) The proposal of a Deep Reinforcement Learning-based approach to tackle the web phishing detection problem, i.e., an imbalanced classification problem.5) The proposal of a case study addresses by means of a Q-Learning-based agent to discover Safety-Critical States in simulated OT scenarios, such as Smart Grid.6) A systematic review on several state-of-the-art Machine Learning algorithms, applied to different cyber threats detection problems, such as: 1) Malware Detection (performed an evaluation of Shallow and Deep Learning algorithms); 2) Phishing Detection (performed an evaluation of Boosting and Deep Learning algorithms); 3) DoS/DDoS Detection (performed an evaluation of Shallow Learning algorithms).7) The realisation of scientific articles leading to the papers listed in the below "Publications" section. Show less

    • Cyber Security Analyst (SOC)
      • Jun 2019 - Feb 2020

      As Cyber Securty Analyst I performed in-depth analysis of security incidents occured on the Customer's network infrastructure. In particular, I worked for the aerospace and financial industries. Furthermore, I performed some developer activies, such as the implementation of: 1) SIEM correlation rules aimed at aggregating one (or more) security alert(s) triggered by security network devices such as IDS or IPS, in order to create a specific security incident; 2) Implementation and analysis of monitoring rules aimed at generating statistical reports such as dashlets, dashboards and dynamic and interactive charts. The list of tools employed during such an experience is the following: RSA Netwitness / IBM QRadar (SIEM), Trend Micro Deep Discovery Inspector (IDS) / Deep Discovery Director (IDS Concentrator); Qualys for Vulnerability Assesment purposes. Show less

Education

  • Politecnico di Bari
    Master's degree, Automation Engineering (Cyber Physical System), Ingegneria dell'Automazione
    2019 - 2022
  • Politecnico di Bari
    Bachelor's degree, Computer and Automation Engineering, Ingegneria Informatica e dell'Automazione
    2015 - 2018

Community

You need to have a working account to view this content. Click here to join now