Seasoned cybersecurity engineer with over a decade of dedication to AI and cybersecurity. My mission is to revolutionize security operations centers (SOCs) through innovative ML frameworks and automation. As the Founder of my own consultant company, I champion the development of SIEM-free ML solutions for User Behavior Analytics (UBA) and eXtended Detection and Response (XDR) solutions, aiming to expedite threat detection with minimal false positives. My expertise in machine learning along with various security domains gives me an edge in creating innovative solutions with "out of the box" thinking.As an experienced cybersecurity engineer, I have gained extensive expertise and knowledge through diverse roles across various sectors. This experience has sharpened my technical skills in DevSecOps, threat analysis&detection, incident response, vulnerability management and security architecture. Additionally, I've developed strong team leadership and management skills, leading cross-functional teams for enhancing security posture, mentoring staff and contributing to strategic planning. My broad expertise ensures a proactive and strategic approach to protecting digital assets.P.S. "Judge me first by my way of thinking and actions. Critical and rational thinking can assist me with gaining knowledge and adaptability needed to navigate complex situations effectively."
-
Distinguished Security StrategistQuickbaseBulgaria -
Senior Member Of Technical StaffVmware Aug 2022 - Presentโข ๐๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด ๐๐ต๐ฒ ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐บ๐ฒ๐ป๐ ๐ผ๐ณ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ผ๐ป๐๐ฒ๐ป๐ ๐ณ๐ผ๐ฟ ๐ฎ ๐๐ฆ๐ฃ๐ ๐ฝ๐ฟ๐ผ๐ฑ๐๐ฐ๐: Create and refine security content, including policies, rules, and alerts, to enhance the effectiveness of CSPM product. Develop content that addresses security misconfiguration and meets customer needs.โข A๐๐๐ผ๐บ๐ฎ๐๐ถ๐ผ๐ป ๐๐ผ๐ผ๐น: Developed AI framework with web UI for automating content creation and implemented ML for policy/compliance auto mappingโข ๐๐ฒ๐ฎ๐๐๐ฟ๐ฒ ๐ฆ๐๐ฝ๐ฝ๐ผ๐ฟ๐ ๐ฎ๐ป๐ฑ ๐๐ป๐ต๐ฎ๐ป๐ฐ๐ฒ๐บ๐ฒ๐ป๐: Provide support for the development of new product features and enhancements. Collaborate with product managers, developers, and other stakeholders to ensure alignment with security objectives and clients requirements.โข ๐จ๐๐๐ ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐บ๐ฒ๐ป๐: Develop and implement User and Entity Behavior Analytics (UEBA) solutions. Utilize advanced analytics and machine learning techniques to detect and respond to anomalous behavior and potential security threats.โข ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐ป๐ด๐ถ๐ป๐ฒ ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐บ๐ฒ๐ป๐: Design and enhance threat engine solutions to improve detection and response capabilities. Integrate threat intelligence and analytics into CSPM product to strengthen threat identification and mitigation processes.โข ๐๐น๐ผ๐๐ฑ ๐๐๐ ๐๐ป๐๐ถ๐๐น๐ฒ๐บ๐ฒ๐ป๐๐: Work on developing and managing cloud IAM entitlements. Ensure that access controls are properly implemented and aligned with best practices and organizational policies. -
FounderAivisec Feb 2018 - Presentโข ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐ถ๐ป๐ด ๐ฎ ๐ฆ๐๐๐ -๐๐ฟ๐ฒ๐ฒ ๐๐ ๐๐ฟ๐ฎ๐บ๐ฒ๐๐ผ๐ฟ๐ธ: Creating an innovative SIEM-free AI solution specializing in User Behavior Analytics (UBA) and Extended Detection and Response (XDR). This framework is helping SOC teams reduce false positives and quickly create detection rules and correlations.โข ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐ ๐๐ฟ๐ฎ๐บ๐ฒ๐๐ผ๐ฟ๐ธ: Designing a comprehensive vulnerability management system, integrating security scans into the CI/CD pipeline and infrastructure for continuous vulnerability assessment and mitigation.โข ๐ ๐ฎ๐น๐๐ฎ๐ฟ๐ฒ ๐ฅ๐ฒ๐๐ฒ๐ฟ๐๐ฒ ๐๐ป๐ด๐ถ๐ป๐ฒ๐ฒ๐ฟ๐ถ๐ป๐ด: Conducting in-depth reverse engineering to analyze malicious software, enhancing detection and response strategies.โข ๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ผ๐ป ๐๐๐๐ฎ๐ฐ๐ธ๐ฒ๐ฟ ๐ง๐ฒ๐ฐ๐ต๐ป๐ถ๐พ๐๐ฒ๐: Leading research on evolving attacker techniques, developing dynamic behavioral algorithms and modules to detect and prevent network attacks and endpoint exploits.โข ๐๐๐๐ผ๐บ๐ฎ๐๐ถ๐ผ๐ป ๐ณ๐ผ๐ฟ ๐ ๐ฎ๐น๐๐ฎ๐ฟ๐ฒ ๐ฎ๐ป๐ฑ ๐๐ฎ๐๐ฎ ๐๐ป๐ฎ๐น๐๐๐ถ๐: Developing automation scripts to streamline malware and data analysis, increasing efficiency and response speed in security operations.โข ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฎ๐ป๐ฑ ๐๐ผ๐ฟ๐ฒ๐ป๐๐ถ๐ฐ๐ ๐๐ผ๐ป๐๐๐น๐๐ฎ๐ป๐ฐ๐: Providing consultancy in cybersecurity and digital forensics, offering strategic advice and hands-on support to strengthen defenses and respond to incidents.โข ๐จ๐ป๐ถ๐๐ฒ๐ฟ๐๐ถ๐๐ ๐ฃ๐ฟ๐ผ๐ท๐ฒ๐ฐ๐๐ ๐ผ๐ป ๐ ๐ผ๐ฏ๐ถ๐น๐ฒ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ๐ ๐ฎ๐ป๐ฑ ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐: Participating in university research projects on mobile networks and cybersecurity, focusing on machine learning applications to enhance security measures and gain hands-on experience with cutting-edge technologies.
-
Ml And Security ConsultantTechnologyvalley Mar 2017 - Present -
Senior It Security Analyst (Devsecops/Application Security)Gfk Nov 2021 - Aug 2022โข ๐๐ป๐๐ฒ๐ด๐ฟ๐ฎ๐๐ถ๐ป๐ด ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ต๐ฒ๐ฐ๐ธ๐ ๐ถ๐ป ๐๐/๐๐ ๐ฃ๐ถ๐ฝ๐ฒ๐น๐ถ๐ป๐ฒ: Implementing security checks within the CI/CD pipeline, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Cloud Security Assessment (CSA), Software Bill of Materials (SBOM), and secret scans to ensure code security throughout the development lifecycle.โข ๐๐ฒ๐ฝ๐น๐ผ๐๐ถ๐ป๐ด ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฆ๐ฐ๐ฎ๐ป๐ ๐ณ๐ผ๐ฟ ๐๐ป๐ณ๐ฟ๐ฎ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒโข ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐บ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐: Overseeing vulnerability management processes to identify, assess, and remediate security vulnerabilities across applications and infrastructure.โข ๐๐๐๐ผ๐บ๐ฎ๐๐ฒ๐ฑ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐๐ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐ ๐ฆ๐๐๐๐ฒ๐บ: Developed automated Vulnerabilty Management System for CI/CD scans in parallel and forwarding the results into DefectDojo for triage.โข ๐๐ผ๐ป๐ฑ๐๐ฐ๐๐ถ๐ป๐ด ๐๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฅ๐ฒ๐๐ถ๐ฒ๐๐โข ๐๐ผ๐น๐น๐ฎ๐ฏ๐ผ๐ฟ๐ฎ๐๐ถ๐ป๐ด ๐๐ถ๐๐ต ๐ฆ๐ข๐: Working closely with the Security Operations Center (SOC) to deploy and fine-tune potential new alerts utilizing Machine Learning for enhanced threat detection and response.โข ๐๐ ๐ฒ๐ฐ๐๐๐ถ๐ป๐ด ๐๐ฑ-๐๐ผ๐ฐ ๐๐๐๐ผ๐บ๐ฎ๐๐ถ๐ผ๐ป ๐ง๐ฎ๐๐ธ๐: Handling various ad-hoc automation tasks to streamline security processes and improve overall efficiency within the security operations.โข ๐๐ฟ๐ฒ๐ฎ๐๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐ ๐ฎ๐ป๐ฎ๐ด๐ถ๐ป๐ด ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฑ๐ฎ๐๐ต๐ฏ๐ผ๐ฎ๐ฟ๐ฑ: Participating in the development of a CTO-level monthly security dashboard featuring a security grade from A to F for each business area. This initiative fostered a sense of competition and significantly reduced security risks, enhance awareness and drive action. -
Senior Cybersecurity Engineer | Emea Team LeadShutterfly Jun 2018 - Nov 2021โข ๐ง๐ฒ๐ฎ๐บ ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ๐๐ต๐ถ๐ฝ: Leading a team of security analysts across the EMEA region, providing guidance, support, and oversight to ensure effective delivery of SOC services and alignment with organizational security goals.โข ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐ฒ๐ฑ ๐ ๐ ๐ถ๐บ๐ฝ๐น๐ฒ๐บ๐ฒ๐ป๐๐ฎ๐๐ถ๐ผ๐ป ๐ณ๐ผ๐ฟ ๐จ๐๐๐: Developed internal UEBA tool with ML. Successfully detected/correlated numerous security incidents and effectively correlated independent anomaly alerts from a regular penetration test, which were not apparent and missed with the classical SOC approach.โข ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐: Oversee the identification, assessment, and remediation of vulnerabilities to strengthen the client's security defenses.โข ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ ๐๐ฎ๐๐ต๐ฒ๐ฟ๐ถ๐ป๐ด: Collect and analyze threat intelligence to stay ahead of emerging threats and inform proactive security measures.โข ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐๐ป๐๐ถ๐ป๐ด: Actively seek out and identify potential threats within the clientโs environment through advanced threat-hunting techniques.โข ๐ฆ๐ฝ๐น๐๐ป๐ธ ๐๐ผ๐ด ๐๐ป๐ด๐ฒ๐๐๐ถ๐ผ๐ป: Develop Python agents for log forwarding using Kafka or REST API, ensuring seamless integration and ingestion of log data into Splunk.โข ๐ฆ๐ข๐๐ฅ ๐จ๐๐ฒ ๐๐ฎ๐๐ฒ ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐บ๐ฒ๐ป๐: Design and implement SOAR use cases to streamline incident response and automate repetitive tasks.โข ๐ฆ๐ฝ๐น๐๐ป๐ธ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ผ๐ป๐๐ฒ๐ป๐ ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐บ๐ฒ๐ป๐: Develop Splunk rules and dashboards tailored to SOC requirements, providing actionable insights and improving threat detection capabilities. Develop Splunk add-ons for task automation, enhancing operational efficiency.โข ๐๐ป๐ฑ๐ฝ๐ผ๐ถ๐ป๐ ๐ฉ๐ถ๐๐ถ๐ฏ๐ถ๐น๐ถ๐๐ ๐ฎ๐ป๐ฑ ๐๐ป๐ผ๐บ๐ฎ๐น๐ ๐๐ฒ๐๐ฒ๐ฐ๐๐ถ๐ผ๐ป: Implement machine learning models using Apache Spark (AWS EMR) or Python modules for distributed/parallel processing to enhance endpoint visibility and detect anomalies.โข ๐๐ฑ-๐๐ผ๐ฐ ๐๐๐๐ผ๐บ๐ฎ๐๐ถ๐ผ๐ป -
Senior Machine Learning EngineerHuawei Technologies Jul 2017 - Jan 2018Paris Area, Franceโข ๐๐ฟ๐ฎ๐บ๐ฒ๐๐ผ๐ฟ๐ธ ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐บ๐ฒ๐ป๐ ๐ณ๐ผ๐ฟ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ ๐ฆ๐ถ๐บ๐๐น๐ฎ๐๐ถ๐ผ๐ป: Design and develop innovative frameworks to simulate mobile networks and traffic patterns. Create high-performance models that accurately represent network behavior under various conditions to support analysis and decision-making.โข ๐ง๐ฟ๐ฎ๐ณ๐ณ๐ถ๐ฐ ๐ ๐ผ๐ฑ๐ฒ๐น๐ถ๐ป๐ด: Develop and refine models to simulate different types of network traffic, including user behavior, data flows, and application demands. Ensure models are capable of handling diverse scenarios and accurately predicting network performance.โข ๐ฆ๐ฒ๐น๐ณ-๐ข๐ฟ๐ด๐ฎ๐ป๐ถ๐๐ฎ๐๐ถ๐ผ๐ป ๐๐น๐ด๐ผ๐ฟ๐ถ๐๐ต๐บ๐: Design and test machine learning-based algorithms that enable network self-organization. Focus on algorithms that allow networks to adapt to changing conditions, optimize resource allocation, and improve overall network resilience.โข ๐๐น๐ด๐ผ๐ฟ๐ถ๐๐ต๐บ ๐ง๐ฒ๐๐๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐ฉ๐ฎ๐น๐ถ๐ฑ๐ฎ๐๐ถ๐ผ๐ป: Conduct rigorous testing and validation of simulation frameworks and machine learning algorithms. Ensure accuracy, scalability, and reliability of developed solutions through comprehensive performance evaluations.โข ๐๐ผ๐น๐น๐ฎ๐ฏ๐ผ๐ฟ๐ฎ๐๐ถ๐ผ๐ป ๐ฎ๐ป๐ฑ ๐๐ป๐๐ฒ๐ด๐ฟ๐ฎ๐๐ถ๐ผ๐ป: Work closely with other engineering teams and stakeholders to integrate designed algorithms into existing testing network infrastructure. Provide technical support and guidance to ensure seamless implementation.โข ๐๐ผ๐ฐ๐๐บ๐ฒ๐ป๐๐ฎ๐๐ถ๐ผ๐ป ๐ฎ๐ป๐ฑ ๐ฅ๐ฒ๐ฝ๐ผ๐ฟ๐๐ถ๐ป๐ดโข ๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ฎ๐ป๐ฑ ๐๐ป๐ป๐ผ๐๐ฎ๐๐ถ๐ผ๐ป -
Security Operation Center AnalystHewlett Packard Enterprise Oct 2015 - Jul 2017โข Accepting and analyzing security incidents related to the supported customer environment.โข Identifying all symptoms of the reported incident in order to establish the effect on customer business operations.โข Employment of diagnostics scripts, tools, known error databases and knowledge base to assist with the initial diagnosis and determining possible applicable solution, temporary fixes and workarounds.โข Generic troubleshooting within the applicable technology platform that Security Operations Center Analyst is responsible for. -
Ran Development EngineerTelenor Bulgaria Feb 2014 - Mar 2015Bulgaria, Sofiaโขโขโข Distinguished Recognition: Earned a company distinguished reward for significant contributions to the successful renovation project, highlighting exceptional performance and impact.Key Responsibilities:โข ๐ฆ๐๐ฝ๐ฝ๐ผ๐ฟ๐ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ ๐ฃ๐น๐ฎ๐ป๐ป๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐บ๐ฒ๐ป๐: Assist in the planning and development of GSM/UMTS networks across the country, ensuring effective deployment and optimization.โข ๐๐ฎ๐ฝ๐ฎ๐ฐ๐ถ๐๐ ๐ฅ๐ฒ๐ฐ๐ผ๐ป๐ณ๐ถ๐ด๐๐ฟ๐ฎ๐๐ถ๐ผ๐ป: Support the process of reconfiguring the capacity of existing base stations to meet evolving network demands and enhance performance.โข ๐๐ฒ๐น๐น ๐ฃ๐น๐ฎ๐ป๐ป๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐๐ถ๐ป๐ธ ๐๐๐ฑ๐ด๐ฒ๐ ๐๐ฎ๐น๐ฐ๐๐น๐ฎ๐๐ถ๐ผ๐ป๐: Conduct Nominal Cell Planning, plan BSC (Base Station Controller) borders, and perform Link Budget Calculations based on prepared projects to ensure optimal network coverage and efficiency.โข ๐ฆ๐ถ๐๐ฒ ๐๐ผ๐๐ฒ๐ฟ๐ฎ๐ด๐ฒ ๐๐๐๐ฒ๐๐๐บ๐ฒ๐ป๐: Prepare computer simulations and evaluate the planned site coverage and existing mobile network performance to identify areas for improvement.โข ๐๐ป๐๐ฒ๐ป๐ป๐ฎ ๐ฆ๐๐๐๐ฒ๐บ ๐๐ฒ๐๐ถ๐ด๐ป: Design base station antenna systems to ensure robust and reliable network connectivity.โข ๐ง๐ฒ๐ฐ๐ต๐ป๐ผ๐น๐ผ๐ด๐ ๐๐ฒ๐๐ฒ๐น๐ผ๐ฝ๐บ๐ฒ๐ป๐ ๐ฎ๐ป๐ฑ ๐๐บ๐ฝ๐น๐ฒ๐บ๐ฒ๐ป๐๐ฎ๐๐ถ๐ผ๐ป: Contribute to the development and implementation of modern technologies within the mobile network to drive innovation and enhance service quality.โข ๐ฃ๐ฟ๐ผ๐ท๐ฒ๐ฐ๐ ๐๐ป๐๐ผ๐น๐๐ฒ๐บ๐ฒ๐ป๐: Participate in key projects such as the Rollout 2014/15 and the Renovation of the Telenor mobile network 2014/15, contributing to their successful completion and deployment. -
Physical Network ArchitectBtc, Vivacom Jun 2011 - Aug 2012Bulgaria, Sofiaโข ๐๐ฒ๐๐ถ๐ด๐ป๐ถ๐ป๐ด ๐๐ป๐ณ๐ฟ๐ฎ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ: Developing detailed designs for optical cable infrastructure, ensuring that solutions are scalable, reliable, and aligned with client requirements and industry standards.โข ๐ฃ๐ฟ๐ผ๐ท๐ฒ๐ฐ๐ ๐ข๐๐ฒ๐ฟ๐๐ถ๐ด๐ต๐: Managing the end-to-end deployment process of optical cable infrastructure, including planning, coordination, and execution, to ensure timely and successful project completion.โข ๐ฉ๐ฒ๐ป๐ฑ๐ผ๐ฟ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐: Overseeing third-party vendors involved in the installation and construction of optical cable networks. Ensuring that vendors adhere to project specifications, quality standards, and safety regulations.โข ๐๐น๐ถ๐ฒ๐ป๐ ๐๐ผ๐น๐น๐ฎ๐ฏ๐ผ๐ฟ๐ฎ๐๐ถ๐ผ๐ป: Engaging with business clients to understand their specific needs, providing expert recommendations, and offering ongoing support throughout the project lifecycle.โข ๐ค๐๐ฎ๐น๐ถ๐๐ ๐๐๐๐๐ฟ๐ฎ๐ป๐ฐ๐ฒ: Conducting regular inspections and assessments to ensure that the installed infrastructure meets design specifications and performance standards. Addressing and resolving any issues or discrepancies.โข ๐๐ผ๐ฐ๐๐บ๐ฒ๐ป๐๐ฎ๐๐ถ๐ผ๐ป ๐ฎ๐ป๐ฑ ๐ฅ๐ฒ๐ฝ๐ผ๐ฟ๐๐ถ๐ป๐ด: Maintaining comprehensive documentation of design plans, project progress, and vendor performance. Providing regular updates and reports to clients and internal stakeholders.โข ๐๐ผ๐บ๐ฝ๐น๐ถ๐ฎ๐ป๐ฐ๐ฒ ๐ฎ๐ป๐ฑ ๐๐ฒ๐๐ ๐ฃ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ๐: Ensuring that all aspects of the optical cable infrastructure adhere to relevant regulations, industry best practices, and company policies.โข ๐ง๐ฒ๐ฐ๐ต๐ป๐ถ๐ฐ๐ฎ๐น ๐๐ ๐ฝ๐ฒ๐ฟ๐๐ถ๐๐ฒ: Utilizing deep technical knowledge of optical cable systems, network architecture, and related technologies to solve complex problems and optimize infrastructure performance.
Plamen Semov Education Details
-
Cognitive Networks -
Autonomous Networks -
Self-Organizing Networks -
Telecommunications Engineering
Frequently Asked Questions about Plamen Semov
What company does Plamen Semov work for?
Plamen Semov works for Quickbase
What is Plamen Semov's role at the current company?
Plamen Semov's current role is Distinguished Security Strategist.
What schools did Plamen Semov attend?
Plamen Semov attended Technical University Sofia, Technische Universitรคt Darmstadt, Aalborg Universitet, Aalborg University, Technical University Sofia.
Who are Plamen Semov's colleagues?
Plamen Semov's colleagues are Vaishnavi Mande, Antonio Kamp, Danny Lowe, Stephie William, Aleksandar Georgiev, Chris White, Chetan Pruthi.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records ร $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial