Roy Shemer

Senior Security Engineer at Blacklane
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Munich, Bavaria, Germany, DE

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • Germany
    • Travel Arrangements
    • 200 - 300 Employee
    • Senior Security Engineer
      • Jul 2021 - Jan 2022

      • Worked closely with DevOps, developers, and stakeholders to securely design, deploy, and implement systems and software as Blacklane expands and rolls out new features. • Performed Application Security Testing, Secure Design/Code, Threat Modeling, Security Monitoring, Incident Response, SDLC, and Security Architecture training and Security awareness across departments. • Researched, and integrated security tools into CI/CD pipeline, including container security, SAST… Show more • Worked closely with DevOps, developers, and stakeholders to securely design, deploy, and implement systems and software as Blacklane expands and rolls out new features. • Performed Application Security Testing, Secure Design/Code, Threat Modeling, Security Monitoring, Incident Response, SDLC, and Security Architecture training and Security awareness across departments. • Researched, and integrated security tools into CI/CD pipeline, including container security, SAST with SonarQube and DAST application scanning, third-party vulnerability scanning mainly with Burp Suite, etc. • Enhanced Information Security policies and Security Architecture. Advising different stakeholders on IT Security subjects. • Mentored DevOps engineers, developers, and product owners about IT Security best practices and standards. Show less

    • United States
    • Software Development
    • 100 - 200 Employee
    • Product Manager
      • Mar 2020 - Jun 2021

      • Managed, developed, and integrated processes for Cybint Bootcamp product – a cyber security product that prepares people with little or no background in IT for entry-level jobs in the field. • Acted as the main subject matter expert for developing content and attack simulations for the product. • Developed virtual machine labs and simulations using AWS - EC2, ECS/EKS. • Collaborated with different departments such as the instructional designers and developers to define and execute… Show more • Managed, developed, and integrated processes for Cybint Bootcamp product – a cyber security product that prepares people with little or no background in IT for entry-level jobs in the field. • Acted as the main subject matter expert for developing content and attack simulations for the product. • Developed virtual machine labs and simulations using AWS - EC2, ECS/EKS. • Collaborated with different departments such as the instructional designers and developers to define and execute product objectives. • Defined the Bootcamp courses content, learning objectives, and goals. • Managed Cybint's AWS Cloud Security: IAM, SSO, AWS WAF & Shield, Amazon Inspector, Amazon GuardDuty, CloudTrail, AWS KMS, Cognito. Show less

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Security Data Analyst
      • Oct 2018 - Nov 2019

      Tel Aviv - Jaffa, Tel Aviv District, Israel • Analyzed and detected customer web application and network attacks. Developed relevant security policies, rules and signatures to improve product detections. • Searched for undetected threats and false positive events. • Wrote queries and scripts with Elasticsearch, SQL and Python, using Kibana, SQL Server, PyCharm. Mostly for ElasticDB, RedShift, MongoDB and Redis. • Worked with F5 BIG-IP product to detect and analyze attacks. • Investigated suspicious OWASP Top 10 and OWASP… Show more • Analyzed and detected customer web application and network attacks. Developed relevant security policies, rules and signatures to improve product detections. • Searched for undetected threats and false positive events. • Wrote queries and scripts with Elasticsearch, SQL and Python, using Kibana, SQL Server, PyCharm. Mostly for ElasticDB, RedShift, MongoDB and Redis. • Worked with F5 BIG-IP product to detect and analyze attacks. • Investigated suspicious OWASP Top 10 and OWASP Automated Threats events and scenarios on customers to detect malicious bots and attacks. • Worked with the data science team to build ML models for classifying and detecting attacks. • Generated security incident reports to F5 customers via statistics and analysis. • Checked for Zero-Day attacks and new CVEs on daily basis. Show less

    • United States
    • Computer and Network Security
    • 700 & Above Employee
    • SOC Engineer
      • Feb 2017 - Oct 2018

      Tel Aviv • Worked at the security operations center team with hand on Imperva's SecureSphere WAF product. • Provided first response to security incidents, focused on the operational aspect of web-application security: analyzing the threat, suggesting immediate methods of remediation and mitigation, and actively working to block attacks in real-time. • Identified true-positives and false-positive attacks targeting customer's websites. • Analyzed and identified DoS & DDoS attacks, Brute-Force… Show more • Worked at the security operations center team with hand on Imperva's SecureSphere WAF product. • Provided first response to security incidents, focused on the operational aspect of web-application security: analyzing the threat, suggesting immediate methods of remediation and mitigation, and actively working to block attacks in real-time. • Identified true-positives and false-positive attacks targeting customer's websites. • Analyzed and identified DoS & DDoS attacks, Brute-Force attacks, WAF attacks, Scraping and filtering of unwanted traffic, and also performed the initial analysis and mitigation of application attack vectors, such as XSS, SQLi, LFi/RFI and RCE. Show less

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • SOC Analyst Tier-2
      • 2016 - 2017

      Be’er Sheva Area, Israel • Identified malicious ICS/SCADA and IT activity, reviewed low signature attack patterns over time using statistical analysis of events and by appropriate queries. • Collected, analyzed and investigated SIEM-Events and ICS/SCADA-Events originated from Israeli power plants SIEMs and external sources. • Created and maintained operational reports for Key Performance Indicators as well as monthly metrics. • Utilized Cyber Security and Big-Data tools RSA Archer and Splunk to analyze and… Show more • Identified malicious ICS/SCADA and IT activity, reviewed low signature attack patterns over time using statistical analysis of events and by appropriate queries. • Collected, analyzed and investigated SIEM-Events and ICS/SCADA-Events originated from Israeli power plants SIEMs and external sources. • Created and maintained operational reports for Key Performance Indicators as well as monthly metrics. • Utilized Cyber Security and Big-Data tools RSA Archer and Splunk to analyze and prevent future attacks. Show less

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Information Security Analyst
      • 2014 - 2016

      Tel Aviv, Israel • Identified security attack attempts targeted clients websites. • Used Incapsula and Sumo Logic (SIEM tool) to identify Cyber threats. • Interrogated suspicious activities (potential Malwares, Trojans, Viruses and Rootkits). • Provided reports and solutions to clients regarding attack attempts. • Blacklisted and blocked suspicious attack vectors and IP addresses.

    • Tank technician
      • 2008 - 2010

      Israel * Efficiently repaired large vehicles and equipment in the field under stressful situations * Troubleshot and identified potential system problems * Worked closely with a team to ensure all equipment functioned to high efficiency and exceeded safety standards

Education

  • The College of Management Academic Studies
    Bachelor of Science (B.Sc.), Computer Science
    2011 - 2014

Community

You need to have a working account to view this content. Click here to join now