Daniel P.

Daniel P. Email and Phone Number

Sr. Principal Researcher @ Palo Alto Networks
United States
Daniel P.'s Location
United States, United States
Daniel P.'s Contact Details

Daniel P. personal email

n/a
About Daniel P.

An experienced security researcher with extensive technical skills gained from reverse engineering highly-obfuscated applications and operating systems, hardware and software vulnerability research, malware analysis, forensics, penetration testing, protocol analysis, system hardening, application development, and risk mitigations. Technical skills are enhanced with strong leadership and communication abilities gained through leading projects, working in large and small teams, and writing technical reports for public articles and customers. Daniel is credited with the first-ever Windows containers escape, the discovery of multiple vulnerabilities, and is a regular speaker at major security conferences. Would never skip an opportunity to participate in a CTF or to research a sophisticated malware. Love video games and anti-cheats reverse engineering and usually do that as a hobby, for educational purposes.

Daniel P.'s Current Company Details
Palo Alto Networks

Palo Alto Networks

View
Sr. Principal Researcher
United States
Employees:
17854
Daniel P. Work Experience Details
  • Palo Alto Networks
    Sr. Principal Researcher
    Palo Alto Networks
    United States
  • Palo Alto Networks
    Sr. Principal Security Researcher
    Palo Alto Networks May 2019 - Present
    Santa Clara, California, Us
    Specialized in vulnerability research, reverse engineering, and low-level programming for both cloud and endpoint security products. Experienced in identifying, analyzing, and responding to vulnerabilities in our products and others.
  • Self-Employed
    Game Security Engineer
    Self-Employed Oct 2011 - Present
    In addition to my role as a security researcher, I have a deep passion for reverse engineering video game anti-cheat systems. Over the past decade, I've explored this as a hobby, developing expertise in bypassing advanced anti-cheat and anti-tampering systems. My projects, primarily in C/C++, required extensive reverse engineering and deobfuscation skills.
  • Nyotron
    Security Researcher
    Nyotron Nov 2017 - May 2019
    Hertzlia, *, Il
    At Nyotron (acquired by Acronis), I played a key role in enhancing endpoint protection for Windows and Linux systems. My work involved researching undocumented Windows APIs, developing defense mechanisms, identifying product vulnerabilities, analyzing malware, and investigating attack techniques. I utilized tools like IDA, x64dbg, API Monitor, and libraries like madCodeHook, with coding primarily in C, C++, and Python.
  • Kayhut
    Security Researcher
    Kayhut Nov 2016 - Oct 2017
    Herzeliya, Il
    At KayHut, I developed and maintained Python-based fuzzers for various applications and operating systems. I analyzed the output to identify potential vulnerabilities, which were then passed to the vulnerability research team for further investigation.
  • Check Point Software Technologies, Ltd.
    Malware Analyst
    Check Point Software Technologies, Ltd. Aug 2015 - Nov 2016
    Redwood City, California, Us
    As part of the post-infection analysis team, I conducted static and dynamic research on malware, including ransomware and RATs. I used tools like Cuckoo Sandbox, Wireshark, and IDA to analyze malware behavior and network communications. My role involved developing network protection rules, updating existing protections, creating automation tools in Python, and proactively searching for emerging threats on platforms like VirusTotal. I also served as the team's expert on malware post-infection analysis.
  • Netmission
    Web Security Engineer
    Netmission Oct 2010 - Apr 2015

Daniel P. Skills

Linux Python Java C# Powerpoint Network Security Wireshark Malware Analysis Leadership Customer Service Management Object Oriented Design Microsoft Office Microsoft Excel Project Management Programming Php Web Development Gateway Vmware Vmware Workstation Microsoft Word Research Object Oriented Languages Vmware Esx Vmware Vsphere Photoshop

Daniel P. Education Details

  • Ben-Gurion University Of The Negev
    Ben-Gurion University Of The Negev
    Computer Science

Frequently Asked Questions about Daniel P.

What company does Daniel P. work for?

Daniel P. works for Palo Alto Networks

What is Daniel P.'s role at the current company?

Daniel P.'s current role is Sr. Principal Researcher.

What is Daniel P.'s email address?

Daniel P.'s email address is dp****@****int.com

What schools did Daniel P. attend?

Daniel P. attended Ben-Gurion University Of The Negev.

What skills is Daniel P. known for?

Daniel P. has skills like Linux, Python, Java, C#, Powerpoint, Network Security, Wireshark, Malware Analysis, Leadership, Customer Service, Management, Object Oriented Design.

Who are Daniel P.'s colleagues?

Daniel P.'s colleagues are Sami Walle, German Rincon, Shivakumar Yuvaraj, Hyndavi K E, Kevin Jackson, Emran Mazumder, Edward Sin.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.