Joel Eriksson Email and Phone Number
Joel Eriksson work email
- Valid
- Valid
- Valid
- Valid
Joel Eriksson personal email
Joel Eriksson phone numbers
Founder of ClevCode.We do vulnerability research, exploit development, reverse-engineering, as well as development of tools related to these areas. We very rarely do anything in public, and we focus on building strong relationships with carefully chosen clients rather than advertising ourselves to the public. We target everything from browsers to kernels to basebands.If you are a vulnerability researcher yourself, feel free to get in touch to see if there might be an opportunity for us to work together.Previously the CTO and Head of R&D and joint-owner of Cycura, now acquired by WELL Health Technologies, and before that the CTO and Head of R&D and joint-owner/co-founder of Bitsec, that was acquired by NIXU.As a general rule, I don't get involved with companies unless I have a personal stake in them and believe in their vision. Freedom, with regards to managing my own time and the time of my resources, is very important to me. I need to feel that whatever it is I'm doing is the best way forward to reach the goals that we have set, and when I do, I will give it 100%.I care a lot more about doing interesting things than about recognition and publicity, but when it makes strategic sense (and time allows) - I can do both. ;)From 2015 to 2020, I was the CTO of Cycura. During this time, I was focusing on building our R&D and offensive security division, as well as being a key resource in the teams in question. The last few years, I have been focusing mostly on mobile security research, mostly on the Android side, but nothing public.From 2011 to 2015, I was just focusing on my own company (ClevCode), and participated in various CTFs and other types of challenges. A selection:- 2015: Winner of Boxen- 2015: Winner of SweCTF- 2014: 2nd place in Codegate Quals- 2013: Winner of Black Knight challenge (nSense)- 2013: 3rd place in SECUINSIDE Finals in South Korea- 2012: Cicada 3301 (Google it + my name)- 2011: Winner of PlaidCTFFrom 2006 to 2011, I was the CTO of Bitsec. We worked on a lot of interesting things, and I was fortunate enough to be able to speak on at least a few of them in public. We did kernel exploitation, including one of the earliest examples of remote wireless kernel exploitation, full-chain Windows exploitation, and I started getting into mobile security research (remote full-chain iOS, etc):- 2008: Speaker at the RSA Conference in San Francisco- 2007: Speaker at BlackHat Europe in Amsterdam- 2007: Speaker at BlackHat USA in Las Vegas- 2007: Speaker at DefCon in Las VegasRunning out of characters, so - EOF
-
CtoArma Instruments Ag Jul 2024 - Present
-
Ceo/FounderClevcode Ltd Jan 2011 - PresentPafos, CyOriginally started as ClevCode AB in Sweden, until I moved to Cyprus and started ClevCode Ltd. We do vulnerability research, exploit development and reverse-engineering, focusing mostly on mobile, browser and kernel exploitation.We have never advertised, and pretty much everything we do is confidential. Our clients tends to find us, and they tend to stay. We are primarily working with long-term research contracts, and we are very selective with regards to the clients we would be open to work with. -
It Security ResearcherInternet 1993 - Present
-
CtoCycura Inc. Sep 2013 - Aug 2020Toronto, On, CaWe provide advanced penetration testing and R&D-related services within the IT-security sector, for clients with high security demands. -
CtoBitsec Ab Jun 2006 - Feb 2011http://www.bitsec.com/en/
-
CeoBitnux Ab Jan 2003 - Jun 2006Systems development. Security assessments. Vulnerability research. Developing and holding trainings in the area of vulnerability analysis, reverse-engineering and exploit development. Malware analysis.
-
DeveloperUtilator Ab Jun 2001 - Dec 2002System and security administration. Embedded systems development.
-
It Security Specialist, Systems Administrator & DeveloperFreelancer Jun 1996 - Jun 2001System and security administration. Penetration testing and security assessments. Writing for security related magazines. Systems development for Unix (Linux, Solaris, *BSD), Windows and telecom related systems.
Joel Eriksson Skills
Joel Eriksson Education Details
-
University Of Gävle
Frequently Asked Questions about Joel Eriksson
What company does Joel Eriksson work for?
Joel Eriksson works for Clevcode Ltd
What is Joel Eriksson's role at the current company?
Joel Eriksson's current role is Vulnerability researcher, exploit developer, reverse-engineer and entrepreneur..
What is Joel Eriksson's email address?
Joel Eriksson's email address is je****@****nux.com
What is Joel Eriksson's direct phone number?
Joel Eriksson's direct phone number is (647) 479*****
What schools did Joel Eriksson attend?
Joel Eriksson attended University Of Gävle.
What skills is Joel Eriksson known for?
Joel Eriksson has skills like Penetration Testing, Malware Analysis, Reverse Engineering, Network Security, Security, Computer Security, Computer Forensics, Application Security, Linux, Information Security, Programming, Exploit Development.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial