Uriel Kosayev

Founder at TrainSec.net
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Tel Aviv District, Israel, IL
Languages
  • Hebrew Native or bilingual proficiency
  • English Native or bilingual proficiency
  • Russian Native or bilingual proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 15 ratings
  • (15)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Tal Sarid

I highly recommend Uriel, a skilled and seasoned Security Researcher with a specialization in bypassing EDR systems. As an experienced professional, Uriel has demonstrated exceptional expertise in identifying vulnerabilities in complex systems and devising effective strategies for remediation. Uriel has a proven track record of success in performing comprehensive penetration tests for clients in various industries, including finance, healthcare, and government. His extensive knowledge of EDR systems and his ability to bypass them make him an invaluable asset to any organization seeking to protect their networks and data. In addition to his technical skills, Uriel is highly professional and communicative. He is able to explain complex technical issues in clear, concise terms that are easily understandable by non-technical stakeholders. He is also able to work collaboratively with clients and other members of a project team to ensure that all goals are met, and expectations are exceeded. Overall, I highly recommend Uriel for any organization seeking a skilled and experienced Security Researcher with a specialization in bypassing EDR systems. He is an exceptional professional who is dedicated to delivering high-quality results and providing excellent service to his clients.

Amichai Yifrach

Being a cyber security researcher myself for more than 20 years now, I found Uriel and his courses highly educational and a must for those who aspire to be experts in RE, MA, or incident response. Even for me, as an experienced researcher in the cyber world, during the courses, the PoCs and techniques Uriel presented were successfully tested and reproduced by me and my team sharpening our tools. Furthermore, some of the ideas were the fine tuning my more advanced research in this field needed.

Max Malyutin

The one and only master, thank you! Your knowledge and your passion for Cyber makes you a great teacher!!!

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • CCSK - Certificate of Cloud Security Knowledge
    Cloud Security Alliance
    Sep, 2020
    - Nov, 2024
  • CNSS - Certified Network Security Specialist
    ICSI (International CyberSecurity Institute), UK
    May, 2020
    - Nov, 2024
  • Android Malware Analysis
    Udemy
    Jan, 2020
    - Nov, 2024
  • LTE & VoLTE Systems
    Motorola Solutions
    Jan, 2018
    - Nov, 2024
  • Malware Analysis & Reverse Engineering
    Cybrary
    Oct, 2016
    - Nov, 2024
  • DFIR - Digital Forensics & Incident Response
    Cybrary
    Jan, 2016
    - Nov, 2024
  • Malware Reverse Engineering
    Pluralsight
    Jan, 2016
    - Nov, 2024
  • VoIP Systems
    IDF - Israel Defence Forces
    Jan, 2016
    - Nov, 2024
  • Windows Internals
    Pluralsight
    Jan, 2016
    - Nov, 2024
  • LPI - Linux Essentials
    LPI Nederland
    Nov, 2015
    - Nov, 2024
  • Advanced Penetration Testing
    Cybrary
    Jan, 2015
    - Nov, 2024
  • Penetration Testing & Post Exploitation
    Cybrary
    Jan, 2015
    - Nov, 2024
  • Python SPSE
    Pentester Academy
    Jan, 2015
    - Nov, 2024
  • Python for Security Professionals
    Cybrary
    Jan, 2015
    - Nov, 2024
  • Social Engineering
    Cybrary
    Jan, 2015
    - Nov, 2024
  • Community Edition All-Star
    RangeForce
    Sep, 2021
    - Nov, 2024
  • CCNA - Cisco Certified Network Associate
    Cisco
    Aug, 2015
    - Nov, 2024
  • CCENT - Cisco Entry Networking Technician
    Cisco
    Jul, 2015
    - Nov, 2024
  • CCSA - Check Point Certified Security Administrator
    Check Point Software Technologies, Ltd.
    Mar, 2016
    - Nov, 2024
  • CyberOps
    Cisco

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Founder
      • Jul 2023 - Present

    • Israel
    • Computer and Network Security
    • Founder | Researcher | Trainer
      • Sep 2019 - Present

      Our live courses are available now, register at: https://malwareanalysis.co/training-workshops-and-services/ As the importance and need to fight malware-based threats are rapidly growing, it is more important to share and collaborate knowledge to fight those threats. This is why we at MalwareAnalysis.co decided to take another big step and create this page that includes three of our courses that Uriel Kosayev will mentor. On this page, you will get the information you need to start and advance in your professional journey as a Cybersecurity researcher. Show less

    • Security Researcher | Consultant | Lecturer
      • Jan 2014 - Present

      Professional Services: CISO as a Service Security System Evaluation - AV/EDR, DLP, Mail-Gateway, Web Gateway, WAF, and more. Product Vulnerability Research and Reverse Engineering. Security Tools Development and Automation. Red Teaming. Penetration Testing. Cloud Security. Application Security. Trainer and Lecturer: Bar-Ilan University. UPES (University of Petroleum and Energy Studies). See-Security. HIT College. ITC - Israel Tech Challenge. Technological Institute of Naamat Rishon Lezion. KERNELiOS. HackerU. Lomda Learning Center. And more... Show less

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Principal Security Researcher (Contractor)
      • Dec 2022 - Present

    • Israel
    • Education Administration Programs
    • 1 - 100 Employee
    • Head of Cybersecurity Education (Contractor)
      • 2022 - Present

    • Belgium
    • Manufacturing
    • 700 & Above Employee
    • Red Team Manager
      • Nov 2021 - Oct 2022

    • United Kingdom
    • E-Learning Providers
    • 500 - 600 Employee
    • Book Author - Antivirus Bypass Techniques
      • Nov 2018 - Jun 2021

      Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions. The book starts by introducing you to the cybersecurity landscape, focusing on cyber threats, malware, and more. You will learn how to collect leads to research antivirus and explore the two common bypass approaches used by the authors. Once you’ve covered the essentials of antivirus research and bypassing, you'll get hands-on with bypassing antivirus software using obfuscation, encryption, packing, PowerShell, and more. Toward the end, the book covers security improvement recommendations, useful for both antivirus vendors as well as for developers to help strengthen the security and malware detection capabilities of antivirus software. By the end of this security book, you'll have a better understanding of antivirus software and be able to confidently bypass antivirus software. Show less

    • Israel
    • Software Development
    • 1 - 100 Employee
    • Malware Researcher & Reverse Engineer
      • 2019 - 2020

      Malware Research & Reverse Engineer of macOS malware. Detection Engineering. Research & threat hunting of malicious web threats. Detection development of highly sophisticated threat actors (APT level). Technical blog writing. Malware Research & Reverse Engineer of macOS malware. Detection Engineering. Research & threat hunting of malicious web threats. Detection development of highly sophisticated threat actors (APT level). Technical blog writing.

    • Israel
    • Defense and Space Manufacturing
    • 400 - 500 Employee
    • Security Researcher
      • Jun 2016 - Feb 2019

      Conduct malware research, reverse engineering, develop and implement IoC static, dynamic and heuristic-based detections. Develop Malware and Forensics automation procedures (especially with Python). Firmware Vulnerability Research of network and IoT devices. Develop methodologies and conduct digital forensics & incident response. Conduct Threat Hunting of highly operational networks. Research fields: Windows Internals, Network devices, Firmware, SCADA, RF, VoIP, Cellular (LTE, GSM), Mobile (Android, iOS). Show less

    • Israel
    • Computer and Network Security
    • Founder & Instructor
      • Jan 2014 - Feb 2016

      The YouTube channel provides content on the following topics: 1. Windows Server Management (MCSA). 2. Working with Linux operating systems. 3. Information Security and Hacking. 3. Working with SQL databases. 4. Development in Java, Perl, JavaScript. And much more... Channel aims: 1. Provide high-quality content followed by a practical approach. 2. Answer questions related to the topics. 3. Help people who want to advance in the IT & security field as much as possible. Show less

    • IT Admin & Security Integrator
      • 2012 - 2016

      Administration of SMB networks. Administration of cloud-based solutions such as Azure and AWS. Evaluation of security threats and implementation of security solutions followed by best practices. Administration of SMB networks. Administration of cloud-based solutions such as Azure and AWS. Evaluation of security threats and implementation of security solutions followed by best practices.

Education

  • IDF - Israel Defense Forces
    Security Researcher & Investigator
    2017 - 2017
  • Self Taught
    ICT and Information Security Practical Engineer
    2014 - 2016

Community

You need to have a working account to view this content. Click here to join now