Gabriel A.

Cyber Security Consultant at Omnient
  • Claim this Profile
Contact Information
Location
Bucharest, Romania, RO
Languages
  • Romanian Native or bilingual proficiency
  • English Professional working proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Alexandru Serghie

I met Gabriel as a student of his Cisco classes. In general, the trainers I met in IT were all very well informed, with high background knowledge and very focused on students needs and getting them to better levels. Gabriel is one of them and it excelled in all areas, even being very close to his students and even helping them in their day by day activities without expecting any reward. Later I was also one of the thousands students in his online classes and I have to say that the high level of quality is still to be found. I highly recommend him as a trainer!

Teofil BOCANCEA

Gabriel is a very dedicated specialist. We, at "PPerformance GmbH", have a long and fruitful cooperation and we are very satisfied of his cooperation and good consulting on the network configuration and security. We warmly recommend Gabriel on that field!

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Google Cybersecurity Certificate
    Coursera
    Aug, 2023
    - Sep, 2024
  • API Penetration Testing - Certificate of Completion
    APIsec University
    Jul, 2023
    - Sep, 2024
  • ICS-SCADA Cybersecurity
    EC-Council
    Jan, 2023
    - Sep, 2024
  • Certified Incident Handler (ECIH)
    EC-Council
    Oct, 2022
    - Sep, 2024
  • Offensive Security Certified Expert (OSCE)
    Offensive Security
    Apr, 2021
    - Sep, 2024
  • Offensive Security Wireless Professional (OSWP)
    Offensive Security
    Aug, 2020
    - Sep, 2024
  • Offensive Security Web Expert (OSWE)
    Offensive Security
    Jul, 2020
    - Sep, 2024
  • CHFI (Computer Hacking Forensic Investigator)
    EC-Council
    May, 2018
    - Sep, 2024
  • CREST Practitioner Security Analyst - CPSA
    CREST - www.crest-approved.org
    Jan, 2017
    - Sep, 2024
  • CREST Registered Penetration Tester - CRT
    CREST - www.crest-approved.org
    Jan, 2017
    - Sep, 2024
  • Certified EC-Council Instructor (CEI)
    EC-Council
    Jan, 2016
    - Sep, 2024
  • ISO 27001 Lead Auditor
    BSI
    Mar, 2015
    - Sep, 2024
  • OSCP - Offensive Security Certified Proffessional
    Offensive Security
    Mar, 2015
    - Sep, 2024
  • ECSA - EC-Council Certified Security Analyst
    EC-Council
    Jan, 2015
    - Sep, 2024
  • Cisco Networking Academy® Introduction to the Internet of Everything
    Cisco
    Oct, 2014
    - Sep, 2024
  • Introduction to Cybersecurity
    Cisco
    Jun, 2014
    - Sep, 2024
  • 210W - Cybersecurity for Industrial Control Systems Cyber Emergency Response Team
    U.S. Department of Homeland Security; Industrial Control Systems Cyber Emergency Response Team (ICS-CERT); National Cybersecurity and Communications Integration Center (NCCIC)
    Apr, 2014
    - Sep, 2024
  • CEH - Certified Ethical Hacker
    EC-Council
    Jun, 2013
    - Sep, 2024
  • Cyber Security Auditor
    National Cyber Security Directorate
    Dec, 2021
    - Sep, 2024
  • Advanced Linux & INFOSEC
    Crystal Mind Academy
  • CCAI
    Cisco
  • CCNA
    Cisco
  • CCNA Security
    Cisco
  • CCNP Routing
    Cisco
  • CCNP Switching
    Cisco
  • LFS101x.2: Introduction to Linux
    The Linux Foundation
  • Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure
    Microsoft
  • Project Management
    SCHULTZ CONSULTING
  • VMWare vSphere Install, Configure, Manage
    VMware

Experience

    • Romania
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Cyber Security Consultant
      • Oct 2018 - Present

      Perform penetration testing (black box / white box testing) for web application, mobile applications (IOS and Android), internal and external infrastructure, Wi-Fi, IoT devices, Social Engineering Tests (Phishing or other types), ICS-SCADA (Industrial Control System and Critical Infrastructure); providing customized security trainings. Perform penetration testing (black box / white box testing) for web application, mobile applications (IOS and Android), internal and external infrastructure, Wi-Fi, IoT devices, Social Engineering Tests (Phishing or other types), ICS-SCADA (Industrial Control System and Critical Infrastructure); providing customized security trainings.

    • Germany
    • IT Services and IT Consulting
    • 400 - 500 Employee
    • Lead Penetration Tester
      • May 2022 - Present

      Hired to lead a security engineering team, focused on ethical hacking – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. • Perform penetration testing (black box / white box testing) for API, web and mobile applications. • Make recommendations on security weaknesses and report on activities and findings and assist with the development of remediation services for identified findings. • Help Engineering Team with IT Security Strategy, also develop and deliver IT Security Trainings Show less

    • Romania
    • IT Services and IT Consulting
    • Founder, Ethical Hacker and IT Security Trainer - learn.ituniversity.ro
      • Sep 2006 - Present

      ITuniversity is an online platform designed to promote and deliver Cisco’s trainings. Since 2011 – transformed into an online-only platform in 2011. The platform provides on-demand video courses related to IT and IT Security, and security awareness. Perform penetration testing (black box / white box testing) for web application, mobile applications (IOS and Android), internal and external infrastructure, Wi-Fi, IoT devices, Social Engineering Tests (Phishing or other types), ICS-SCADA (Industrial Control System and Critical Infrastructure); providing customized security trainings. I deliver in-person, in-class, and later on-demand recorded trainings. I am also a content writer for custom courses and labs, working in close collaboration with other online platforms that deliver courses, such as EC-council CodeRed, Udemy, Udemy for Business, Stackcommerce, and Stackskills. Within the platform, I serve as the Legal Main Contact and Curriculum Leader for Cisco Academy. - Ethical Hacker and IT Security Consultant for various national and international customers - Trainer for CEH, ECSA, CHFI, ECIH by EC-Council - Trainer for 'OT Cybersecurity - Adanced Training in a Critical Infrastructure' - Trainer for: Web Application Hacking and Network Infrastructure Hacking, Burp Suite for advanced Web Hacking, Hack People Instead of Systems. Social Engineering Basics, Advanced Mobile Penetration Testing of Android Applications - More details on learn.ituniversity.ro and www.ituniversity.ro - Training students for CCNA and CCNA Security Certification - Training NDG Linux Basics - Legal Main Contact - Curriculum Leader - Independent Security Researcher: Reflected XSS vulnerabilities discovered in Wordpress Plugins - Simple Contact Form Plugin – PirateForms version 1.0.18 - Better WordPress reCAPTCHA <= 2.0.3 - Unauthenticated Cross-Site Scripting (XSS) https://wpvulndb.com/vulnerabilities/9146 Show less

    • Romania
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • IT Security Trainer
      • Nov 2019 - Present

      Delivering IT Security Courses: - Certified Ethical Hacker (CEH) - EC-Council Certified Security Analyst (ECSA) - custom security training: Ethical Hacking, Security Awareness and Social Engineering, GDPR - A practical guide for developers, Secure Coding, etc. Delivering IT Security Courses: - Certified Ethical Hacker (CEH) - EC-Council Certified Security Analyst (ECSA) - custom security training: Ethical Hacking, Security Awareness and Social Engineering, GDPR - A practical guide for developers, Secure Coding, etc.

    • India
    • E-Learning Providers
    • 1 - 100 Employee
    • Freelancer IT Instructor
      • Jun 2015 - Present

      Trainer for the following courses: - Advanced Mobile Penetration Testing of Android Applications - Step by Step Network Infrastructure Ethical Hacker - Step by Step Web Application Ethical Hacking - Learn Burp Suite for Advanced Web Penetration Testing - Learn Server Security with Bitninja - Ethical Hacking si Penetration Testing pe intelesul tuturor - Hack People instead of Systems. Social Engineering Basics - Introduction to Cisco Packet Tracer Network Simulator - Setup your own Hosting Environment - Basics of VMware vSphere and ESXi Virtualization Software - Storage Solution for Home and Business - ownCloud Show less

    • India
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Technical Lead, Senior Information Security Consultant & Penetration Tester
      • Apr 2021 - May 2022
    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Content Writer
      • Sep 2021 - Apr 2022
    • Romania
    • Information Technology & Services
    • 1 - 100 Employee
    • Technical Lead, Senior Information Security Consultant & Penetration Tester
      • Apr 2020 - Apr 2021

    • Senior Information Security Consultant & Penetration Tester
      • Oct 2012 - Apr 2020

      Information Technology, Metro Systems' clients are worldwide Metro/Makro Cash&Carry, Media Markt, Saturn, Galeria Kaufhof , multinational companies acting in the IT and retail industry.I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. Act as an effective participant in a multidisciplinary security project team.-Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking). Make recommendations on security weaknesses and report on activities and findings.- Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated) for API, web and mobile applications- Assist with the development of remediation services for identified findings- Customize, operate, audit, and maintain security-related tools and applications Show less

    • United Kingdom
    • Education Management
    • 1 - 100 Employee
    • Tutor
      • Jan 2018 - Jan 2020

      Tutor for Cybercrime Diploma Level 3 Tutor for Cybercrime Diploma Level 3

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • IT Security Trainer
      • Apr 2016 - Nov 2019

      Delivering IT Security Courses: - Certified Ethical Hacker (CEH) - EC-Council Certified Security Analyst (ECSA) - custom security training: Ethical Hacking, Security Awareness and Social Engineering, GDPR - A practical guide for developers, Secure Coding, etc. Schedules: www.newhorizons.ro Delivering IT Security Courses: - Certified Ethical Hacker (CEH) - EC-Council Certified Security Analyst (ECSA) - custom security training: Ethical Hacking, Security Awareness and Social Engineering, GDPR - A practical guide for developers, Secure Coding, etc. Schedules: www.newhorizons.ro

    • United States
    • Computer and Network Security
    • 700 & Above Employee
    • CEH & ECSA Training Course Review Board Member
      • Aug 2017 - Jul 2018

      The EC-Council Training Course Board is a member based network of volunteers that are recognized by EC-Council and the society as key leaders in the field of information security. They are carefully selected from either the academia and/or industry that are committed in creating current awareness in information security. An invitation is extended to these individuals to be part of the Advisory Board and the selection criteria are based on their credibility and contribution to the e-business and security community. More importantly, they remain an independent voice for the industry. Show less

    • United Kingdom
    • Information Technology & Services
    • 1 - 100 Employee
    • IT Security Trainer (contract)
      • Nov 2015 - Oct 2016

      Delivering IT Security Courses: - Certified Ethical Hacker (CEH) - EC-Council Certified Security Analyst (ECSA) Delivering IT Security Courses: - Certified Ethical Hacker (CEH) - EC-Council Certified Security Analyst (ECSA)

    • Network and Security Engineer
      • Nov 2011 - Oct 2012

      - CheckPoint CluterintXL configuration and manage - Cisco Call Manager Express configuration and administration - LAN and WAN connections administration and monitoring (Security, VLANs, WLAN, Cisco, etc) - VPN connections administration - Firewall and remote access implementation, administration and monitoring (Checkpoint, Cisco ASA) - DNS, DHCP, Anti-spam, Proxy administration (Linux and Windows Server, Cisco IronPort), FTP - VoIP system installation and administration - Contracts management : VPN, Internet, branch office cabling - Web and Mail Filtering Administration and monitoring - IPS Configuration and management - business continuity with high availability and recovery site configuration - configuring, administration and monitoring BGP - Level 2 Support for problems concerning network and VPN connectivity, Security Show less

    • Health, Wellness & Fitness
    • 1 - 100 Employee
    • IT Consultant - Project Based/Freelancer
      • Feb 2010 - Sep 2012

      IT Consultant - Project Based 15.02.2010 - 22.02.2010, 11.2010, 01.2011, 08.2012, 10.2012, 1-7.2013, 3-4.2014, 5.2015, 04.2015- Company activity field: -Offering logistics for General Motors and GMAC Financial Services -Binding agent between GM (General Motors), GMAC Financial Services and Austrian auto dealers in Austria -Manage sales in Austria for General Motors (Opel, Chevrolet) Responsibilities: -audit network infrastructure -redesigning logical network -install and configure Microsoft SQL Server 2008 -install and configure the following roles in Windows 2008 Server: Hyper-V,Active Directory, terminal services, file and printer server, DNS, FTP, and DHCP -applying policy restrictions for employee's computers -configuring firewall and router for enhanced security and remote access -Configuring network equipment for accessing LAN and WAN -Configuring DMZ for servers -technical training for IT administrator and users -install and configure VMware vSphere, -configuring VPN -configure Fortigate UTM Show less

    • Higher Education
    • 1 - 100 Employee
    • IT Consultant
      • Nov 2008 - Nov 2011

      Involved in Research Projects for E.ON Gas Distribution: "Determination of Customer Profiles" and "Optimizing Customer Profiles", “Designing and programming a non-SAP application for improving the coefficients of customer profile’s function ”, Involved in Projects for Transgaz Romania: „Theoretical analyze of transport capacity”Responsibilities:-Designing and developing special software for data processing and storing in a database, using Visual Studio 2008 (C# Windows Forms and SQL Server)-Retrieving useful data from database and creating reports-Install and configure IIS and DNS in Windows 2008 Server-Install and configure Microsoft SQL Server 2008, FTP, DHCP, DNS and HTTP Servers-Install and configure Simone Software-Configuring network equipment for accessing LAN and WAN-Configuring DMZ for servers-Redesigning logical network-Install, Configure, Manage VMware vSphere Show less

    • IT Technician
      • Oct 2007 - Oct 2008

      -Administrating the network and the IT equipments (web & mail servers, routers, switches) of the university-debugging hardware & trouble-shooting software problems-offering remote and in-person help-desk assistance for users-installing servers for OS deployment using Acronis Deployment Server

    • Network Engineer - Project Based
      • Jan 2008 - Feb 2008

      -audit network infrastructure -redesign logical network -install and configure the following roles in Windows 2008 Server: Active Directory, terminal services, file and printer server, DNS, FTP, and DHCP -apply policy restrictions for student's computers -configure firewall and router for enhanced security and remote access -Configure network equipment for accessing LAN and WAN -install servers for OS deployment using Acronis Deployment Server -audit network infrastructure -redesign logical network -install and configure the following roles in Windows 2008 Server: Active Directory, terminal services, file and printer server, DNS, FTP, and DHCP -apply policy restrictions for student's computers -configure firewall and router for enhanced security and remote access -Configure network equipment for accessing LAN and WAN -install servers for OS deployment using Acronis Deployment Server

Education

  • WU Executive Academy
    Executive MBA, Business Administration and Management, General
    2023 - 2025
  • Harvard Business School
    Harvard ManageMentor® Completion Certificates, Business
    2016 - 2017
  • Universitatea „Politehnica” din București
    Master's degree, Security in Complex Information Networks
    2011 - 2013
  • "Oil and Gas" University of Ploiesti
    Master's degree, Transportation, Depositing and Hydrocarbons Delivery Technology
    2011 - 2013
  • "Oil and Gas" University of Ploiesti
    Bachelor's degree, Automatic, Computers
    2007 - 2011

Community

You need to have a working account to view this content. Click here to join now