About

Radosław Żuber

Experienced security incident handler. Wide area of interests focusing on, but not limited to, banking malware and exploiting vulnerabilities
Practical knowledge of botnets modus operandi. Lecturer and enthusiast of GNU/Linux and Python. I also love to improve my skills by solving challenges and hacking machines on Hack The Box platform.
Credo: If you did something twice by hand – script it. Or better - use Ansible.

Apart from security interests I love playing Enemy Territory (you can get new, cool, rewritten client from here ) - usually with great ET gamming community Prime Squadron. I'm also huge fan of games from Paradox Interactive. And of course Witcher series from CD Project RED. I highly recommend you reading Andrzej Sapkowski books!

When I step away from the keyboard I like to cheer for titans in ski jumping and hop on my bike.

Contact Me

Feel free to contact me. But please be aware that I might not respond immediately. E-mail is preffered form of contact.

e-mail

radoslaw [at) zuber.pro
coldy (at] spam-and-abuse.pl (CFEC72FBF7283AB8EC95653887215FEDD9014152.pub)

IRC

coldy @ IRCnet

Education

2004 - 2010
Master of Engineering in Physics, Warsaw University of Technology
Faculty of Applied Physics, Specialty: Solid State Physics

Experience

Standard Chartered Bank, Warsaw, Poland (Sep 2019 - Present)

Senior Specialist, Security Penetration Testing (Sep 2019 - Present)

Bank Millennium, Warsaw, Poland (Jan 2017 - Aug 2019)

Senior IT Security Specialist, Threat Intelligence Team (Jan 2018 - Aug 2019)
IT Security Specialist, Threat Intelligence Team (Jan 2017 - Dec 2017)
  • 3rd line incident handling (malware analysis, malicious network activity analysis)
  • reviewing business processes and applications in terms of security
  • pen-testing internal and external applications
  • providing security consultancy
  • developing small incident handling related projects (mainly with Python)

CERT Polska / NASK, Warsaw, Poland (Oct 2011 - Dec 2016)

Senior IT Security Specialist, Security Incident Response Team (Jan 2016 - Dec 2016)
IT Security Specialist, Security Incident Response Team (Oct 2011 - Dec 2015)
  • responsibilities similar to the ones above
  • taking part in botnet takesdowns (e.g. Dorkbot, Virut, Citadel)
  • managing n6 clients