Orel Bitan
VP Cyber Research at CyTwist- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
Malware Analysis
John BryceJun, 2017- Nov, 2024 -
Android App Development
HackerU - האקריו המרכז ללימודי מחשבים והשמת עובדים בהייטקJan, 2017- Nov, 2024 -
Security Network Forensics
John Bryce
Experience
-
CyTwist
-
Israel
-
Information Technology & Services
-
1 - 100 Employee
-
VP Cyber Research
-
Aug 2021 - Present
-
-
-
John Bryce
-
Higher Education
-
300 - 400 Employee
-
Senior Lecturer
-
Jan 2019 - Jan 2023
- Teaching an entry level cyber security training - Training SOC & IR - Writing new materials - Teaching an entry level cyber security training - Training SOC & IR - Writing new materials
-
-
-
Cellcom
-
Israel
-
Telecommunications
-
700 & Above Employee
-
Incident Response Team Leader
-
Aug 2018 - Aug 2021
- Designing and launching proactive operations as part of Threat Hunting - Establishing a SOC management training - Development of an investigation system that includes an agent -Attending as a guest lecturer in the world of Forensics and IR at Ono Academic College, The Academic College of Tel Aviv-Yaffo and more
-
-
Senior Security Analyst at Incident Response Team
-
Aug 2017 - Aug 2018
-Development Playbook On SOAR System -Windows internals,Disk/Memory forensics, and Malware analysis -Threat hunting
-
-
-
Israeli Air Force
-
Israel
-
Defense and Space Manufacturing
-
700 & Above Employee
-
CIRT Team
-
Aug 2014 - Aug 2017
First Sergeant in the Israeli Air Force's RedTeam, experience in the following fields: - Incident Response - Digital Forensics (HD & Memory) - Proactive testing - Malware Analysis - Tools and Automation Development - Mobile forensics - Penetration Testing - Network Security Monitoring - Reverse Engineering First Sergeant in the Israeli Air Force's RedTeam, experience in the following fields: - Incident Response - Digital Forensics (HD & Memory) - Proactive testing - Malware Analysis - Tools and Automation Development - Mobile forensics - Penetration Testing - Network Security Monitoring - Reverse Engineering
-
-