Marek Zmysłowski

Marek Zmysłowski Email and Phone Number

Senior Security Engineer @ Microsoft, Expert @ AI Security Foundation @ AI Security Foundation
Marek Zmysłowski's Location
Warsaw, Mazowieckie, Poland, Poland
Marek Zmysłowski's Contact Details

Marek Zmysłowski work email

Marek Zmysłowski personal email

n/a
About Marek Zmysłowski

Offensive Security Certified Professional (OSCP), Offensive Security Certified Expert (OSCE) and GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) (expired 30th of April 2018) with 12 years of penetration testing experience and a comprehensive background in C and C++ programming, reverse engineering, and general network and infrastructure security. • Extensive experience in multiple programming languages: C and C++11 mastering, Python and shell scripts • Broad knowledge of domain optimization decision processes • Skilled in application fuzzing using for example honggfuzz, LLVM or AFL tools • In-depth technical knowledge of security engineering, computer and network security, authentication and security protocols

Marek Zmysłowski's Current Company Details
AI Security Foundation

Ai Security Foundation

View
Senior Security Engineer @ Microsoft, Expert @ AI Security Foundation
Marek Zmysłowski Work Experience Details
  • Ai Security Foundation
    Security Expert
    Ai Security Foundation Apr 2024 - Present
  • Microsoft
    Senior Security Engineer
    Microsoft Apr 2022 - Present
    Redmond, Washington, Us
  • Standard Chartered Bank
    Penetration Testing Lead
    Standard Chartered Bank May 2020 - Mar 2022
    London, England, Gb
    Technical lead for the penetration testing team (30 people total), manager for penetration testing group (8people)Designing and implementing the processes around the penetration testing service.
  • Cycura Inc.
    Security Researcher
    Cycura Inc. Sep 2018 - Apr 2020
    Toronto, On, Ca
    Working on the internal fuzzing platform (currently Linux operating system)Different research type related to fuzzing and improvementsBuilding reverse tainting tool for the crash analysis based on the TaintgrindInternal research about in-memory fuzzing
  • Samsung Electronics
    Principal Security Engineer
    Samsung Electronics May 2017 - Aug 2018
    Suwon-Si, Gyeonggi-Do, Kr
    Leading the fuzzing farm project for the Samsung Android devices (100+ devices connected with AFL)Leading the “Fuzzing Multimedia Codecs” project (the code is internal)Assessing the latest Samsung flagship devices (Galaxy S8, Note 8, Galaxy S9, Note 9, Gear S3)Designed and created Automatic Crash Analyzer (tool for the crash pre-triage)
  • Microsoft
    Security Software Engineer Ii
    Microsoft May 2015 - Apr 2017
    Redmond, Washington, Us
    Team member: Microsoft Security Response Center - Vulnerabilities & Mitigations.Triaging the IE/Edge security issues reported by the users (design issues and memory corruptions).Triaging the Office security issues reported by the users ((design issues and memory corruptions).Designing and implement the Office mitigations.Designing and implementing internal security tools.
  • Owasp
    Owasp Poland Board Member
    Owasp Mar 2011 - Dec 2016
    Wakefield, Ma, Us
  • Trustwave Spiderlabs
    Application Security Consultant
    Trustwave Spiderlabs Jun 2014 - Apr 2015
    Chicago, Illinois, Us
    Lead of Mobile Virtual Testing Team – team responsible for the mobile application testing methodologyTest applications for iOS and Android mobile devicesSource code review (C and C++) for the PCI DSS compliancePerform Web application pentest
  • Royal Bank Of Scotland
    Lead Penetration Testing Specialist
    Royal Bank Of Scotland Jun 2013 - May 2014
    Gogarburn, Gb
    • Develop and maintain Framework and Methodology documentation• Manage pentest laboratory containing virtual machines in vSphere environment• Perform Web application penetration testing and source code review (Java, C++, .NET) for internalbanking applications• Test applications for iOS and Android mobile devices• Assess application security using reverse engineering, binary disassembly and binary code analysis• Investigate spam and phishing emails• Coaching and mentoring other employees;• Supervising more junior members of staff;
  • Royal Bank Of Scotland
    Penetration Testing Specialist
    Royal Bank Of Scotland Jul 2011 - May 2013
    Gogarburn, Gb
    Web Application penetration testing;Reverse engineering, binary disassembly and binary code analysis of application for Microsoft Windows, iOS and Linux;Source code review (Objective C, Java, .Net);Malware analysis;Penetration testing of operating systems (Windows, Linux)Network/infrastructure security testingTesting banking and payment systemsAnalysis and presentation of complex dataSecurity testing with OSSTMM and OWASP methodologyDevelop and maintain security testing guidelinesEvaluate and recommend suitable commercial and public domain secuirty tools
  • Safe Computing
    It Security Specialist/Expert
    Safe Computing Mar 2008 - Jun 2011
    Warsaw, Mazowieckie, Pl
    Searching for web vulnerabilities in web applications;Testing applications designed to mobile devices;Auditing Internet Bank Systems (SBI);Developing CUDA password cracker;
  • Citibank International / Citigroup / Bank Handlowy
    Information Security Administrator
    Citibank International / Citigroup / Bank Handlowy Aug 2006 - Feb 2008
    New York, New York, Us
    NIS+ users' accounts administrator- creating, deleting and modification users' accounts on Solaris and Linux servers – locally and in the NIS+;- writing shell scripts to automate administration tasks;- resolving problems related to Unix server accesses;
  • O2.Pl
    C++ Programmer
    O2.Pl Feb 2005 - Jul 2006
    Programming the Tlen application (this is a Internet communicator),, the Tlenofon application (is a voip plugin to the Tlen) and servers under the Linux system related to these applications (C i C++).- developing Tlen and its plugins (I did not program the communication server);- developing the new elements of Tlen (p2p protocol, protocol to send pictures);- errors removing;- programming under the Windows (Borland Builder and Visual Studio) and the Linux;

Marek Zmysłowski Skills

Penetration Testing Information Security Reverse Engineering Owasp Security Audits Linux Security Web Application Security Application Security Vulnerability Assessment Network Security Vulnerability Management Security Research Programming Cryptography Ollydbg Vulnerability Scanning Php Paros Assembler Ida Pro Computer Security Java Active Directory Webscarab Fuzzing Code Auditing Sql Injection Burp Suite Nmap Windows Web Applications Solaris Perl Ldap C# Programming Languages Edirectory Visual C++ Windbg Metasploit Openvas Acunetix Xss Netcat Oscp Osce C C++ Shell Scripting Cyber Security Secure Coding Secure Code Review

Marek Zmysłowski Education Details

  • Warsaw University Of Technology
    Warsaw University Of Technology
    Electronics And Information Technology

Frequently Asked Questions about Marek Zmysłowski

What company does Marek Zmysłowski work for?

Marek Zmysłowski works for Ai Security Foundation

What is Marek Zmysłowski's role at the current company?

Marek Zmysłowski's current role is Senior Security Engineer @ Microsoft, Expert @ AI Security Foundation.

What is Marek Zmysłowski's email address?

Marek Zmysłowski's email address is ma****@****onet.pl

What schools did Marek Zmysłowski attend?

Marek Zmysłowski attended Warsaw University Of Technology.

What skills is Marek Zmysłowski known for?

Marek Zmysłowski has skills like Penetration Testing, Information Security, Reverse Engineering, Owasp, Security Audits, Linux, Security, Web Application Security, Application Security, Vulnerability Assessment, Network Security, Vulnerability Management.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.