Uriel Kosayev
Founder at TrainSec.net- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
Hebrew Native or bilingual proficiency
-
English Native or bilingual proficiency
-
Russian Native or bilingual proficiency
Topline Score
Bio
Tal Sarid
I highly recommend Uriel, a skilled and seasoned Security Researcher with a specialization in bypassing EDR systems. As an experienced professional, Uriel has demonstrated exceptional expertise in identifying vulnerabilities in complex systems and devising effective strategies for remediation. Uriel has a proven track record of success in performing comprehensive penetration tests for clients in various industries, including finance, healthcare, and government. His extensive knowledge of EDR systems and his ability to bypass them make him an invaluable asset to any organization seeking to protect their networks and data. In addition to his technical skills, Uriel is highly professional and communicative. He is able to explain complex technical issues in clear, concise terms that are easily understandable by non-technical stakeholders. He is also able to work collaboratively with clients and other members of a project team to ensure that all goals are met, and expectations are exceeded. Overall, I highly recommend Uriel for any organization seeking a skilled and experienced Security Researcher with a specialization in bypassing EDR systems. He is an exceptional professional who is dedicated to delivering high-quality results and providing excellent service to his clients.
Amichai Yifrach
Being a cyber security researcher myself for more than 20 years now, I found Uriel and his courses highly educational and a must for those who aspire to be experts in RE, MA, or incident response. Even for me, as an experienced researcher in the cyber world, during the courses, the PoCs and techniques Uriel presented were successfully tested and reproduced by me and my team sharpening our tools. Furthermore, some of the ideas were the fine tuning my more advanced research in this field needed.
Max Malyutin
The one and only master, thank you! Your knowledge and your passion for Cyber makes you a great teacher!!!
Tal Sarid
I highly recommend Uriel, a skilled and seasoned Security Researcher with a specialization in bypassing EDR systems. As an experienced professional, Uriel has demonstrated exceptional expertise in identifying vulnerabilities in complex systems and devising effective strategies for remediation. Uriel has a proven track record of success in performing comprehensive penetration tests for clients in various industries, including finance, healthcare, and government. His extensive knowledge of EDR systems and his ability to bypass them make him an invaluable asset to any organization seeking to protect their networks and data. In addition to his technical skills, Uriel is highly professional and communicative. He is able to explain complex technical issues in clear, concise terms that are easily understandable by non-technical stakeholders. He is also able to work collaboratively with clients and other members of a project team to ensure that all goals are met, and expectations are exceeded. Overall, I highly recommend Uriel for any organization seeking a skilled and experienced Security Researcher with a specialization in bypassing EDR systems. He is an exceptional professional who is dedicated to delivering high-quality results and providing excellent service to his clients.
Amichai Yifrach
Being a cyber security researcher myself for more than 20 years now, I found Uriel and his courses highly educational and a must for those who aspire to be experts in RE, MA, or incident response. Even for me, as an experienced researcher in the cyber world, during the courses, the PoCs and techniques Uriel presented were successfully tested and reproduced by me and my team sharpening our tools. Furthermore, some of the ideas were the fine tuning my more advanced research in this field needed.
Max Malyutin
The one and only master, thank you! Your knowledge and your passion for Cyber makes you a great teacher!!!
Tal Sarid
I highly recommend Uriel, a skilled and seasoned Security Researcher with a specialization in bypassing EDR systems. As an experienced professional, Uriel has demonstrated exceptional expertise in identifying vulnerabilities in complex systems and devising effective strategies for remediation. Uriel has a proven track record of success in performing comprehensive penetration tests for clients in various industries, including finance, healthcare, and government. His extensive knowledge of EDR systems and his ability to bypass them make him an invaluable asset to any organization seeking to protect their networks and data. In addition to his technical skills, Uriel is highly professional and communicative. He is able to explain complex technical issues in clear, concise terms that are easily understandable by non-technical stakeholders. He is also able to work collaboratively with clients and other members of a project team to ensure that all goals are met, and expectations are exceeded. Overall, I highly recommend Uriel for any organization seeking a skilled and experienced Security Researcher with a specialization in bypassing EDR systems. He is an exceptional professional who is dedicated to delivering high-quality results and providing excellent service to his clients.
Amichai Yifrach
Being a cyber security researcher myself for more than 20 years now, I found Uriel and his courses highly educational and a must for those who aspire to be experts in RE, MA, or incident response. Even for me, as an experienced researcher in the cyber world, during the courses, the PoCs and techniques Uriel presented were successfully tested and reproduced by me and my team sharpening our tools. Furthermore, some of the ideas were the fine tuning my more advanced research in this field needed.
Max Malyutin
The one and only master, thank you! Your knowledge and your passion for Cyber makes you a great teacher!!!
Tal Sarid
I highly recommend Uriel, a skilled and seasoned Security Researcher with a specialization in bypassing EDR systems. As an experienced professional, Uriel has demonstrated exceptional expertise in identifying vulnerabilities in complex systems and devising effective strategies for remediation. Uriel has a proven track record of success in performing comprehensive penetration tests for clients in various industries, including finance, healthcare, and government. His extensive knowledge of EDR systems and his ability to bypass them make him an invaluable asset to any organization seeking to protect their networks and data. In addition to his technical skills, Uriel is highly professional and communicative. He is able to explain complex technical issues in clear, concise terms that are easily understandable by non-technical stakeholders. He is also able to work collaboratively with clients and other members of a project team to ensure that all goals are met, and expectations are exceeded. Overall, I highly recommend Uriel for any organization seeking a skilled and experienced Security Researcher with a specialization in bypassing EDR systems. He is an exceptional professional who is dedicated to delivering high-quality results and providing excellent service to his clients.
Amichai Yifrach
Being a cyber security researcher myself for more than 20 years now, I found Uriel and his courses highly educational and a must for those who aspire to be experts in RE, MA, or incident response. Even for me, as an experienced researcher in the cyber world, during the courses, the PoCs and techniques Uriel presented were successfully tested and reproduced by me and my team sharpening our tools. Furthermore, some of the ideas were the fine tuning my more advanced research in this field needed.
Max Malyutin
The one and only master, thank you! Your knowledge and your passion for Cyber makes you a great teacher!!!
Credentials
-
CCSK - Certificate of Cloud Security Knowledge
Cloud Security AllianceSep, 2020- Nov, 2024 -
CNSS - Certified Network Security Specialist
ICSI (International CyberSecurity Institute), UKMay, 2020- Nov, 2024 -
Android Malware Analysis
UdemyJan, 2020- Nov, 2024 -
LTE & VoLTE Systems
Motorola SolutionsJan, 2018- Nov, 2024 -
Malware Analysis & Reverse Engineering
CybraryOct, 2016- Nov, 2024 -
DFIR - Digital Forensics & Incident Response
CybraryJan, 2016- Nov, 2024 -
Malware Reverse Engineering
PluralsightJan, 2016- Nov, 2024 -
VoIP Systems
IDF - Israel Defence ForcesJan, 2016- Nov, 2024 -
Windows Internals
PluralsightJan, 2016- Nov, 2024 -
LPI - Linux Essentials
LPI NederlandNov, 2015- Nov, 2024 -
Advanced Penetration Testing
CybraryJan, 2015- Nov, 2024 -
Penetration Testing & Post Exploitation
CybraryJan, 2015- Nov, 2024 -
Python SPSE
Pentester AcademyJan, 2015- Nov, 2024 -
Python for Security Professionals
CybraryJan, 2015- Nov, 2024 -
Social Engineering
CybraryJan, 2015- Nov, 2024 -
Community Edition All-Star
RangeForceSep, 2021- Nov, 2024 -
CCNA - Cisco Certified Network Associate
CiscoAug, 2015- Nov, 2024 -
CCENT - Cisco Entry Networking Technician
CiscoJul, 2015- Nov, 2024 -
CCSA - Check Point Certified Security Administrator
Check Point Software Technologies, Ltd.Mar, 2016- Nov, 2024 -
CyberOps
Cisco
Experience
-
TrainSec
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Founder
-
Jul 2023 - Present
-
-
-
MalwareAnalysis.co
-
Israel
-
Computer and Network Security
-
Founder | Researcher | Trainer
-
Sep 2019 - Present
Our live courses are available now, register at: https://malwareanalysis.co/training-workshops-and-services/ As the importance and need to fight malware-based threats are rapidly growing, it is more important to share and collaborate knowledge to fight those threats. This is why we at MalwareAnalysis.co decided to take another big step and create this page that includes three of our courses that Uriel Kosayev will mentor. On this page, you will get the information you need to start and advance in your professional journey as a Cybersecurity researcher. Show less
-
-
-
-
Security Researcher | Consultant | Lecturer
-
Jan 2014 - Present
Professional Services: CISO as a Service Security System Evaluation - AV/EDR, DLP, Mail-Gateway, Web Gateway, WAF, and more. Product Vulnerability Research and Reverse Engineering. Security Tools Development and Automation. Red Teaming. Penetration Testing. Cloud Security. Application Security. Trainer and Lecturer: Bar-Ilan University. UPES (University of Petroleum and Energy Studies). See-Security. HIT College. ITC - Israel Tech Challenge. Technological Institute of Naamat Rishon Lezion. KERNELiOS. HackerU. Lomda Learning Center. And more... Show less
-
-
-
EPAM Systems
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Principal Security Researcher (Contractor)
-
Dec 2022 - Present
-
-
-
SVCollege
-
Israel
-
Education Administration Programs
-
1 - 100 Employee
-
Head of Cybersecurity Education (Contractor)
-
2022 - Present
-
-
-
AB InBev
-
Belgium
-
Manufacturing
-
700 & Above Employee
-
Red Team Manager
-
Nov 2021 - Oct 2022
-
-
-
Packt
-
United Kingdom
-
E-Learning Providers
-
500 - 600 Employee
-
Book Author - Antivirus Bypass Techniques
-
Nov 2018 - Jun 2021
Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions. The book starts by introducing you to the cybersecurity landscape, focusing on cyber threats, malware, and more. You will learn how to collect leads to research antivirus and explore the two common bypass approaches used by the authors. Once you’ve covered the essentials of antivirus research and bypassing, you'll get hands-on with bypassing antivirus software using obfuscation, encryption, packing, PowerShell, and more. Toward the end, the book covers security improvement recommendations, useful for both antivirus vendors as well as for developers to help strengthen the security and malware detection capabilities of antivirus software. By the end of this security book, you'll have a better understanding of antivirus software and be able to confidently bypass antivirus software. Show less
-
-
-
Airo Security
-
Israel
-
Software Development
-
1 - 100 Employee
-
Malware Researcher & Reverse Engineer
-
2019 - 2020
Malware Research & Reverse Engineer of macOS malware. Detection Engineering. Research & threat hunting of malicious web threats. Detection development of highly sophisticated threat actors (APT level). Technical blog writing. Malware Research & Reverse Engineer of macOS malware. Detection Engineering. Research & threat hunting of malicious web threats. Detection development of highly sophisticated threat actors (APT level). Technical blog writing.
-
-
-
J6 & Cyber Defense Directorate, IDF
-
Israel
-
Defense and Space Manufacturing
-
400 - 500 Employee
-
Security Researcher
-
Jun 2016 - Feb 2019
Conduct malware research, reverse engineering, develop and implement IoC static, dynamic and heuristic-based detections. Develop Malware and Forensics automation procedures (especially with Python). Firmware Vulnerability Research of network and IoT devices. Develop methodologies and conduct digital forensics & incident response. Conduct Threat Hunting of highly operational networks. Research fields: Windows Internals, Network devices, Firmware, SCADA, RF, VoIP, Cellular (LTE, GSM), Mobile (Android, iOS). Show less
-
-
-
Caliber-Training
-
Israel
-
Computer and Network Security
-
Founder & Instructor
-
Jan 2014 - Feb 2016
The YouTube channel provides content on the following topics: 1. Windows Server Management (MCSA). 2. Working with Linux operating systems. 3. Information Security and Hacking. 3. Working with SQL databases. 4. Development in Java, Perl, JavaScript. And much more... Channel aims: 1. Provide high-quality content followed by a practical approach. 2. Answer questions related to the topics. 3. Help people who want to advance in the IT & security field as much as possible. Show less
-
-
-
-
IT Admin & Security Integrator
-
2012 - 2016
Administration of SMB networks. Administration of cloud-based solutions such as Azure and AWS. Evaluation of security threats and implementation of security solutions followed by best practices. Administration of SMB networks. Administration of cloud-based solutions such as Azure and AWS. Evaluation of security threats and implementation of security solutions followed by best practices.
-
-
Education
-
IDF - Israel Defense Forces
Security Researcher & Investigator -
Self Taught
ICT and Information Security Practical Engineer