Lara Sosa
Product Executive; Cyber Vulnerability & Risk Management at Ovalsec- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Experience
-
Ovalsec
-
Israel
-
Computer and Network Security
-
1 - 100 Employee
-
Product Executive; Cyber Vulnerability & Risk Management
-
2022 - Present
Ovalsec is an automated external attack surface protection platform. It provides security teams with an innovative way to continuously discover vulnerabilities, evaluate their damage potential, and prioritize exploitable weaknesses that can result in high-impact breaches. Within my role, I work with client-side secops teams, cisos, and IT leads, helping to integrate, implement and utilize our platform to their security processes. Ovalsec is an automated external attack surface protection platform. It provides security teams with an innovative way to continuously discover vulnerabilities, evaluate their damage potential, and prioritize exploitable weaknesses that can result in high-impact breaches. Within my role, I work with client-side secops teams, cisos, and IT leads, helping to integrate, implement and utilize our platform to their security processes.
-
-
-
AIG
-
United States
-
Insurance
-
700 & Above Employee
-
Red Team Analyst & Tester
-
2018 - 2021
- Gathered information from readily available open-source internet resources to identify exploitable or compromised information, vulnerabilities, abandoned assets, and misconfigurations in the organizational network, to enable senior Red Team Penetrators to launch approved simulated attacks. - Supported post-pentesting remediation and resolutions; employed tools in the fields of Zero Trust, EDR and XDR - Work closely with cross-team IT, DevOps, Security analysts to identify targets, research, scan, and map networks and build out defenses against those attacks. Show less
-
-
-
Delta Air Lines
-
United States
-
Airlines and Aviation
-
700 & Above Employee
-
Vulnerability & Risk Analyst
-
2015 - 2018
- Conduct vulnerability Detection, Identification, Investigation & Mitigation for cloud native applications - Analyzed reports from 3rd party dark-web intelligence vendors - Evaluate hardware and software configurations to meet project specific requirements - Create and maintain documentation on the network environment including location, configuration, parts identification and use - Create and maintain documentation on the network environment including location, configuration, parts identification and use - Work closely with other cross-functional teams within Cybersecurity to identify gaps and improve cybersecurity posture Show less
-
-
-
Wipro
-
India
-
IT Services and IT Consulting
-
700 & Above Employee
-
Information Technology Administrator
-
2013 - 2015
- Conduct Security evaluations of embedded and hosted computer systems, spanning hardware, operating systems, software, and networked devices. Develop security audits from both a logical/theoretical standpoint and a technical/hands-on standpoint. - Created clear and compelling reports that translate evaluations into customer risk assessments. - Provided mentorship to junior and senior engineers in the art of software security assessment. - Evaluated software in source, intermediate, machine code, and binary forms to discover vulnerabilities. work with Security Operations function to ensure a smooth execution of testing activities (e.g. red/purple teaming, competitive cyber games, etc.) Show less
-
-
Education
-
California State University-San Bernardino
Bachelor of Science - BS, Information Systems and Technology