Daniel P. work email
- Valid
- Valid
Daniel P. personal email
An experienced security researcher with extensive technical skills gained from reverse engineering highly-obfuscated applications and operating systems, hardware and software vulnerability research, malware analysis, forensics, penetration testing, protocol analysis, system hardening, application development, and risk mitigations. Technical skills are enhanced with strong leadership and communication abilities gained through leading projects, working in large and small teams, and writing technical reports for public articles and customers. Daniel is credited with the first-ever Windows containers escape, the discovery of multiple vulnerabilities, and is a regular speaker at major security conferences. Would never skip an opportunity to participate in a CTF or to research a sophisticated malware. Love video games and anti-cheats reverse engineering and usually do that as a hobby, for educational purposes.
Palo Alto Networks
View- Website:
- paloaltonetworks.com
- Employees:
- 17854
-
Sr. Principal ResearcherPalo Alto NetworksUnited States -
Sr. Principal Security ResearcherPalo Alto Networks May 2019 - PresentSanta Clara, California, UsSpecialized in vulnerability research, reverse engineering, and low-level programming for both cloud and endpoint security products. Experienced in identifying, analyzing, and responding to vulnerabilities in our products and others. -
Game Security EngineerSelf-Employed Oct 2011 - PresentIn addition to my role as a security researcher, I have a deep passion for reverse engineering video game anti-cheat systems. Over the past decade, I've explored this as a hobby, developing expertise in bypassing advanced anti-cheat and anti-tampering systems. My projects, primarily in C/C++, required extensive reverse engineering and deobfuscation skills.
-
Security ResearcherNyotron Nov 2017 - May 2019Hertzlia, *, IlAt Nyotron (acquired by Acronis), I played a key role in enhancing endpoint protection for Windows and Linux systems. My work involved researching undocumented Windows APIs, developing defense mechanisms, identifying product vulnerabilities, analyzing malware, and investigating attack techniques. I utilized tools like IDA, x64dbg, API Monitor, and libraries like madCodeHook, with coding primarily in C, C++, and Python. -
Security ResearcherKayhut Nov 2016 - Oct 2017Herzeliya, IlAt KayHut, I developed and maintained Python-based fuzzers for various applications and operating systems. I analyzed the output to identify potential vulnerabilities, which were then passed to the vulnerability research team for further investigation. -
Malware AnalystCheck Point Software Technologies, Ltd. Aug 2015 - Nov 2016Redwood City, California, UsAs part of the post-infection analysis team, I conducted static and dynamic research on malware, including ransomware and RATs. I used tools like Cuckoo Sandbox, Wireshark, and IDA to analyze malware behavior and network communications. My role involved developing network protection rules, updating existing protections, creating automation tools in Python, and proactively searching for emerging threats on platforms like VirusTotal. I also served as the team's expert on malware post-infection analysis. -
Web Security EngineerNetmission Oct 2010 - Apr 2015
Daniel P. Skills
Daniel P. Education Details
-
Ben-Gurion University Of The NegevComputer Science
Frequently Asked Questions about Daniel P.
What company does Daniel P. work for?
Daniel P. works for Palo Alto Networks
What is Daniel P.'s role at the current company?
Daniel P.'s current role is Sr. Principal Researcher.
What is Daniel P.'s email address?
Daniel P.'s email address is dp****@****int.com
What schools did Daniel P. attend?
Daniel P. attended Ben-Gurion University Of The Negev.
What skills is Daniel P. known for?
Daniel P. has skills like Linux, Python, Java, C#, Powerpoint, Network Security, Wireshark, Malware Analysis, Leadership, Customer Service, Management, Object Oriented Design.
Who are Daniel P.'s colleagues?
Daniel P.'s colleagues are Sami Walle, German Rincon, Shivakumar Yuvaraj, Hyndavi K E, Kevin Jackson, Emran Mazumder, Edward Sin.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial