Max                                   .

Max . Email and Phone Number

Senior Security Engineer @ Apple
Max .'s Location
San Francisco Bay Area, United States, United States
About Max .

threat intelligence | threat modeling | malware analysis | network hunting | anti-scraping research and data sourcing | anti-cloaking research and data sourcing | ad platform defense against ad fraud | FB/IG platform honeypots for fake engagements | fake engagements detection and mitigation | FB/IG platform deception and decoy for fake engagements | nation-state actors investigations | threat analysis and sourcing | malicious infrastructure research | bot detection | bot infrastructure sourcing and investigation | credential fraud detection | CVE / vulnerability hunting | IoT / hardware analysis for compromise | Security conference speaker | Malicious network traffic analysis / SEIM | CVE / Vuln. / Bug hunter | IoT / SCADA research and honeypot builder | Cyber Underground / Deep Web research and sourcingThe keyword is proactive. Threat Analyst with 15 years of working experience in the field of computer security. Equipped with knowledge in research and development of threat analytics systems, producing white papers based on research work and presenting these research results at security conferences. Participate as a speaker at various security conferences and training seminars regarding the topic of cybercrime and related issues (e.g.cyberterrorism, cybersecurity, underground economy, etc.), like BlackHat, PacSec,Power of Community, DeepSec, VB, APWG. Russian Underground research and the development of security analytics tools are some of the most important parts of my day-to-day work.

Max .'s Current Company Details
Apple

Apple

View
Senior Security Engineer
Max . Work Experience Details
  • Apple
    Apple Information Security
    Apple Jun 2020 - Present
    Cupertino, California, Us
  • Shape Security
    Director Of Threat Research
    Shape Security Oct 2019 - May 2020
    Seattle, Washington, Us
  • Facebook
    Proactive Threat Discovery
    Facebook Jul 2017 - Sep 2019
    - threat intelligence- threat modeling- malware analysis- network hunting- anti-scraping research and data sourcing- anti-cloaking research and data sourcing- ad platform defense against ad fraud- FB/IG platform honeypots for fake engagements- fake engagements detection and mitigation- FB/IG platform deception and decoy for fake engagements- nation-state actors investigations- threat analysis and sourcing- underground / deep web data collection- malicious infrastructure research
  • Shape Security
    Senior Threat Scientist
    Shape Security Aug 2016 - Jul 2017
    Seattle, Washington, Us
    - bot detection- bot infrastructure sourcing and investigation- threat intelligence- threat modeling- malware analysis- network hunting- credential fraud detection- CVE / vulnerability hunting- IoT / hardware analysis for compromise
  • Black Hat
    Speaker
    Black Hat Mar 2017 - Mar 2017
    San Francisco, California, Us
    Presentation of Apple CVE-2017-2414 and Samsung SVE-2016-7654 ALL YOUR EMAILS BELONG TO USExploiting vulnerable email clients via domain name collisionhttps://www.blackhat.com/docs/asia-17/materials/asia-17-Nesterov-All-Your-Emails-Belong-To-Us-Exploiting-Vulnerable-Email-Clients-Via-Domain-Name-Collision.pdfhttps://www.blackhat.com/docs/asia-17/materials/asia-17-Nesterov-All-Your-Emails-Belong-To-Us-Exploiting-Vulnerable-Email-Clients-Via-Domain-Name-Collision-wp.pdf
  • Black Hat
    Speaker
    Black Hat Aug 2016 - Aug 2016
    San Francisco, California, Us
    badWPAD - The Lasting Menace of a Bad Protocol https://www.blackhat.com/docs/us-16/materials/us-16-Goncharov-BadWpad.pdf
  • Trend Micro
    Senior Security Engineer, Cyber Threat Researcher, Security Conference Speaker
    Trend Micro Apr 2001 - Aug 2016
    Tokyo, Japan, Jp
    - Security conference speaker- Malware Analysis- Malicious network traffic analysis / SEIM- CVE / Vuln. / Bug hunter- IoT / SCADA research and honeypot builder- Cyber Underground / Deep Web research and sourcing Senior security Virus Analyst responsible for security consulting to business partners (internal, external), creation of security frameworks, designing technical security architecture, overseeing the build-out of an enterprise incident response process, and creation of the enterprise risk management program. Participated as a speaker in various conferences and training seminars on the topic of cybercrime and related issues (e.g.cyberterrorism, cybersecurity, underground economy, etc.), like BlackHat, DeepSec, VB, APWG etc.Russian Underground Research and Development of secure analytic tools is one of the important parts of daily work.
  • Virus Bulletin
    Speaker
    Virus Bulletin Oct 2011 - Oct 2011
    Wallingford, Gb
    Using Traffic Direction Systemsto simplify fraud and complicate investigations!https://www.virusbulletin.com/uploads/pdf/conference_slides/2011/Goncharov-VB2011.pdf

Frequently Asked Questions about Max .

What company does Max . work for?

Max . works for Apple

What is Max .'s role at the current company?

Max .'s current role is Senior Security Engineer.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.