threat intelligence | threat modeling | malware analysis | network hunting | anti-scraping research and data sourcing | anti-cloaking research and data sourcing | ad platform defense against ad fraud | FB/IG platform honeypots for fake engagements | fake engagements detection and mitigation | FB/IG platform deception and decoy for fake engagements | nation-state actors investigations | threat analysis and sourcing | malicious infrastructure research | bot detection | bot infrastructure sourcing and investigation | credential fraud detection | CVE / vulnerability hunting | IoT / hardware analysis for compromise | Security conference speaker | Malicious network traffic analysis / SEIM | CVE / Vuln. / Bug hunter | IoT / SCADA research and honeypot builder | Cyber Underground / Deep Web research and sourcingThe keyword is proactive. Threat Analyst with 15 years of working experience in the field of computer security. Equipped with knowledge in research and development of threat analytics systems, producing white papers based on research work and presenting these research results at security conferences. Participate as a speaker at various security conferences and training seminars regarding the topic of cybercrime and related issues (e.g.cyberterrorism, cybersecurity, underground economy, etc.), like BlackHat, PacSec,Power of Community, DeepSec, VB, APWG. Russian Underground research and the development of security analytics tools are some of the most important parts of my day-to-day work.
-
Apple Information SecurityApple Jun 2020 - PresentCupertino, California, Us -
Director Of Threat ResearchShape Security Oct 2019 - May 2020Seattle, Washington, Us -
Proactive Threat DiscoveryFacebook Jul 2017 - Sep 2019- threat intelligence- threat modeling- malware analysis- network hunting- anti-scraping research and data sourcing- anti-cloaking research and data sourcing- ad platform defense against ad fraud- FB/IG platform honeypots for fake engagements- fake engagements detection and mitigation- FB/IG platform deception and decoy for fake engagements- nation-state actors investigations- threat analysis and sourcing- underground / deep web data collection- malicious infrastructure research -
Senior Threat ScientistShape Security Aug 2016 - Jul 2017Seattle, Washington, Us- bot detection- bot infrastructure sourcing and investigation- threat intelligence- threat modeling- malware analysis- network hunting- credential fraud detection- CVE / vulnerability hunting- IoT / hardware analysis for compromise -
SpeakerBlack Hat Mar 2017 - Mar 2017San Francisco, California, UsPresentation of Apple CVE-2017-2414 and Samsung SVE-2016-7654 ALL YOUR EMAILS BELONG TO USExploiting vulnerable email clients via domain name collisionhttps://www.blackhat.com/docs/asia-17/materials/asia-17-Nesterov-All-Your-Emails-Belong-To-Us-Exploiting-Vulnerable-Email-Clients-Via-Domain-Name-Collision.pdfhttps://www.blackhat.com/docs/asia-17/materials/asia-17-Nesterov-All-Your-Emails-Belong-To-Us-Exploiting-Vulnerable-Email-Clients-Via-Domain-Name-Collision-wp.pdf -
SpeakerBlack Hat Aug 2016 - Aug 2016San Francisco, California, UsbadWPAD - The Lasting Menace of a Bad Protocol https://www.blackhat.com/docs/us-16/materials/us-16-Goncharov-BadWpad.pdf -
Senior Security Engineer, Cyber Threat Researcher, Security Conference SpeakerTrend Micro Apr 2001 - Aug 2016Tokyo, Japan, Jp- Security conference speaker- Malware Analysis- Malicious network traffic analysis / SEIM- CVE / Vuln. / Bug hunter- IoT / SCADA research and honeypot builder- Cyber Underground / Deep Web research and sourcing Senior security Virus Analyst responsible for security consulting to business partners (internal, external), creation of security frameworks, designing technical security architecture, overseeing the build-out of an enterprise incident response process, and creation of the enterprise risk management program. Participated as a speaker in various conferences and training seminars on the topic of cybercrime and related issues (e.g.cyberterrorism, cybersecurity, underground economy, etc.), like BlackHat, DeepSec, VB, APWG etc.Russian Underground Research and Development of secure analytic tools is one of the important parts of daily work. -
SpeakerVirus Bulletin Oct 2011 - Oct 2011Wallingford, GbUsing Traffic Direction Systemsto simplify fraud and complicate investigations!https://www.virusbulletin.com/uploads/pdf/conference_slides/2011/Goncharov-VB2011.pdf
Frequently Asked Questions about Max .
What company does Max . work for?
Max . works for Apple
What is Max .'s role at the current company?
Max .'s current role is Senior Security Engineer.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial