Sebastian Gil Email and Phone Number
As a Security Researcher, Pentester, and Cybersecurity Engineer with over 20 years of experience, I specialize in offensive security, mobile hacking, and OSINT. My background encompasses Information Technology, Programming, Networking, Telecommunications, and Server Infrastructure (Windows and Linux).My journey in technology began as a curious teenager, driven by an innate desire to understand and deconstruct computer systems. This early passion for hands-on exploration, combined with formal engineering education, has given me a unique perspective that bridges theoretical knowledge with practical expertise. This dual foundation has proven invaluable in my approach to cybersecurity challenges.Throughout my career, I have developed deep expertise across diverse sectors, with significant experience in securing SAP environments, financial services infrastructure, and enterprise systems. My work spans from implementing robust security measures for banking infrastructure and conducting penetration testing for Fortune 500 companies, to leading large-scale SAP forensic investigations and security audits.My "red-minded" approach to cybersecurity allows me to think like an attacker, anticipating and mitigating potential threats. This perspective, combined with lateral thinking, enables me to develop innovative solutions to complex security challenges. My experience in exploit development provides valuable insights into defending against malicious software.In the dynamic field of cybersecurity, I maintain a commitment to continuous learning and professional development. I stay current with emerging threats, new technologies, and evolving security methodologies to enhance my effectiveness in protecting organizations.Based in Argentina, I operate with strong principles of integrity and professionalism, dedicated to creating impactful security solutions for organizations worldwide.Technical Proficiencies:- Operating Systems: Linux, UNIX, Windows, macOS, Android- Databases: MySQL, Oracle, PostgreSQL, MongoDB- Programming Languages: Assembly x86-64, C, C++, Python, PHP, Java, JavaScript, LUA, ABAP- Scripting: BASH/SHELL, Python, JavaScript- Network Security: TCP/IP, SSH, DNS, SSL/TLS- DevSecOps & Tools: Threat modeling, Apache, NGINX, Git, GitHub, GitLab- Cloud & Virtualization: AWS, Azure, Google Cloud, Oracle Cloud, KVM, VMware, Docker, Proxmox- SAP Technologies: ECC, S/4HANA, Fiori, NetWeaver
Vicxer
View-
Security ResearcherVicxer Mar 2024 - PresentMiami, Florida, United StatesSecurity researcher and exploit developer, with a primary focus on SAP business applications.As a key member of the Vicxer team, a leader in ERP cybersecurity services, I work closely with Fortune 500 companies and government organizations. Our mission is to provide holistic and specialized solutions for SAP and Oracle security.My core responsibilities include:- Conducting advanced research on SAP application security- Developing and documenting innovative exploit… Show more Security researcher and exploit developer, with a primary focus on SAP business applications.As a key member of the Vicxer team, a leader in ERP cybersecurity services, I work closely with Fortune 500 companies and government organizations. Our mission is to provide holistic and specialized solutions for SAP and Oracle security.My core responsibilities include:- Conducting advanced research on SAP application security- Developing and documenting innovative exploit techniques for SAP vulnerabilities- Contributing to the development of SAP security monitoring software- Performing SAP and infrastructure penetration testings- Participating in general security audits- Collaborating on large-scale SAP forensic investigationsVicxer distinguishes itself through a more human approach to SAP security, delivering exceptional services without compromising humanity. Our expertise spans over 15 years of working with Fortune 500 companies, allowing us to be involved in remediating some of the most public and damaging SAP breaches.Areas of specialization:SAP Security, SAP Cybersecurity, ERP Security, Siebel Security, Oracle Siebel Security, SAP Hacking, SAP Security Trainings, SAP Forensics, SAP Penetration Testing, and Infrastructure Penetration Testing.For more information: https://www.vicxer.com Show less -
Instructor - Linux Security: Server HackingEducacionit Jun 2024 - PresentCiudad Autónoma De Buenos AiresAs an instructor for the Linux Security: Server Hacking course, I provide comprehensive training on advanced server security topics. The curriculum I teach includes:- User Authentication mechanisms and best practices- Understanding and mitigating DoS/DDoS Attacks- Configuring and optimizing IPTables Rules- Effective Firewall Management techniques- Implementing and managing Intrusion Detection Systems- File and Directory Protection strategies- File System… Show more As an instructor for the Linux Security: Server Hacking course, I provide comprehensive training on advanced server security topics. The curriculum I teach includes:- User Authentication mechanisms and best practices- Understanding and mitigating DoS/DDoS Attacks- Configuring and optimizing IPTables Rules- Effective Firewall Management techniques- Implementing and managing Intrusion Detection Systems- File and Directory Protection strategies- File System Monitoring for security purposes- Implementing Multi-Factor Authentication- Disk Volume Encryption methods and practices- Detecting and removing Hidden Malware in Linux systemsThis course provides comprehensive training in advanced Linux server security. It covers everything from user authentication fundamentals to sophisticated hidden malware detection techniques. The focus on IPTables, firewall management, and IDS emphasizes strong network infrastructure protection. Topics such as multi-factor authentication and disk volume encryption address both system-level and data-level security. This course equips students with essential practical skills to secure and maintain Linux servers in high-security environments. Show less -
Instructor - Wireless NetworksEducacionit Mar 2024 - PresentCiudad Autónoma De Buenos AiresIn the Wireless Networks course, I guide students through the complexities of wireless networking technologies. The course covers:- Introduction to Wireless Networks: fundamental concepts and principles- Wireless network devices: types, functions, and configurations- Design and Planning of wireless networks: best practices and considerations- Advanced Configurations: optimizing network performance and securityThis course delivers a thorough understanding of wireless… Show more In the Wireless Networks course, I guide students through the complexities of wireless networking technologies. The course covers:- Introduction to Wireless Networks: fundamental concepts and principles- Wireless network devices: types, functions, and configurations- Design and Planning of wireless networks: best practices and considerations- Advanced Configurations: optimizing network performance and securityThis course delivers a thorough understanding of wireless networks, from basic concepts to advanced configurations. By covering wireless network design and planning, it prepares students to implement and manage wireless network infrastructures in various environments. The focus on advanced configurations addresses optimization and troubleshooting aspects, preparing students to handle complex scenarios in wireless networking. Show less -
Instructor - Linux SysadminEducacionit Mar 2024 - PresentCiudad Autónoma De Buenos AiresAs the Linux SysAdmin course instructor, I provide in-depth training on essential Linux system administration topics, including:- Operating System fundamentals and advanced concepts- System services and regionalization- Process and compilation management- Storage management techniques- Useful tools and file access methods- Encryption, backups, and automation strategies- System core concepts and management- System logs and graphic services… Show more As the Linux SysAdmin course instructor, I provide in-depth training on essential Linux system administration topics, including:- Operating System fundamentals and advanced concepts- System services and regionalization- Process and compilation management- Storage management techniques- Useful tools and file access methods- Encryption, backups, and automation strategies- System core concepts and management- System logs and graphic services administrationThis course provides exhaustive training in Linux system administration. It covers a wide range of topics, from operating system fundamentals to advanced aspects like process management and compilation. Topics such as encryption, backups, and automation focus on security and operational efficiency. This course prepares students to manage complex Linux systems in professional environments, addressing both technical and strategic aspects of system administration. Show less -
Instructor - CybersecurityEducacionit Mar 2024 - PresentCiudad Autónoma De Buenos AiresIn the Cybersecurity course, I introduce students to crucial aspects of computer security:- Introduction to Computer Security: core concepts and principles- Authentication mechanisms and System Hardening techniques- User and group permissions management- Malware types and antivirus software implementation- Hashes and encryption algorithms: understanding and applicationThis course offers a solid introduction to fundamental concepts of computer security. It covers… Show more In the Cybersecurity course, I introduce students to crucial aspects of computer security:- Introduction to Computer Security: core concepts and principles- Authentication mechanisms and System Hardening techniques- User and group permissions management- Malware types and antivirus software implementation- Hashes and encryption algorithms: understanding and applicationThis course offers a solid introduction to fundamental concepts of computer security. It covers everything from basic principles to more advanced topics like system hardening and encryption algorithms. The focus on permission management and antimalware software addresses both system-level security and external threats. This course lays the groundwork for a comprehensive understanding of cybersecurity, preparing students for roles in system and data protection. Show less -
Instructor - LinuxEducacionit Mar 2024 - PresentCiudad Autónoma De Buenos AiresAs the Linux course instructor, I guide students through the fundamentals of Linux operating systems:- Introduction to Linux: history, distributions, and core concepts- Essential Linux commands and tools- Library and software administration in Linux environments- File permissions and attributes management- Command output interpretation and manipulationThis course provides a comprehensive introduction to Linux, covering from basic concepts to more advanced aspects… Show more As the Linux course instructor, I guide students through the fundamentals of Linux operating systems:- Introduction to Linux: history, distributions, and core concepts- Essential Linux commands and tools- Library and software administration in Linux environments- File permissions and attributes management- Command output interpretation and manipulationThis course provides a comprehensive introduction to Linux, covering from basic concepts to more advanced aspects of system administration. The focus on commands, tools, and file permission management ensures a practical orientation, preparing students to work effectively in Linux environments. Topics such as library and software administration address system maintenance and updating aspects. Show less -
Instructor - NetworksEducacionit Mar 2024 - PresentCiudad Autónoma De Buenos AiresIn the Networks course, I teach students the fundamental concepts of computer networking:- Elements of a network: devices, topologies, and architectures- IP Addressing and subnetting- Network layer models: OSI and TCP/IP- Ethernet standards and routing protocols- Media types, signaling methods, and signal types in networkingThis course offers a solid foundation in computer networking concepts. It covers everything from the basic elements of a network to more… Show more In the Networks course, I teach students the fundamental concepts of computer networking:- Elements of a network: devices, topologies, and architectures- IP Addressing and subnetting- Network layer models: OSI and TCP/IP- Ethernet standards and routing protocols- Media types, signaling methods, and signal types in networkingThis course offers a solid foundation in computer networking concepts. It covers everything from the basic elements of a network to more advanced topics such as layer models and Ethernet standards. Topics like IP addressing and routing prepare students to understand and work with complex networks. The focus on media types and signals covers the physical aspects of networking. Show less -
Instructor - Pc RepairEducacionit Mar 2024 - PresentCiudad Autónoma De Buenos AiresAs the PC Repair course instructor, I guide students through the essentials of computer hardware and maintenance:- Basic Fundamentals of computer systems- Basic Components: identification, function, and installation- Files and Storage systems- Operating System installation and troubleshooting- Diagnostic Tools for hardware and software issues- Practical Experience through hands-on labs and simulationsThis course provides practical training in PC repair and… Show more As the PC Repair course instructor, I guide students through the essentials of computer hardware and maintenance:- Basic Fundamentals of computer systems- Basic Components: identification, function, and installation- Files and Storage systems- Operating System installation and troubleshooting- Diagnostic Tools for hardware and software issues- Practical Experience through hands-on labs and simulationsThis course provides practical training in PC repair and maintenance. It covers everything from basic fundamentals to the use of diagnostic tools, preparing students to identify and resolve a wide range of hardware and software issues. The inclusion of practical experience ensures a hands-on approach, allowing students to directly apply their knowledge in real-world scenarios. Show less -
Instructor - It Support / Technical SupportEducacionit Mar 2024 - PresentCiudad Autónoma De Buenos AiresIn the IT Support / Technical Support course, I provide comprehensive training on various IT disciplines:- Cybersecurity Fundamentals- Linux Fundamentals- Introduction to Networks- Introduction to Wireless Networks- Linux System Administration- PC Repair and HardwareThis course offers comprehensive training in various aspects of technical and IT support. By covering everything from cybersecurity fundamentals to PC repair, it prepares students to handle a wide… Show more In the IT Support / Technical Support course, I provide comprehensive training on various IT disciplines:- Cybersecurity Fundamentals- Linux Fundamentals- Introduction to Networks- Introduction to Wireless Networks- Linux System Administration- PC Repair and HardwareThis course offers comprehensive training in various aspects of technical and IT support. By covering everything from cybersecurity fundamentals to PC repair, it prepares students to handle a wide range of problems and tasks in IT environments. Topics such as wireless networks and Linux system administration equip students with a diverse set of skills, making them versatile in technical support roles. Show less -
Instructor & Course Content Developer - Mobile HackingEducacionit Jan 2024 - PresentCiudad Autónoma De Buenos AiresAs both the instructor and content developer for the Mobile Hacking course, I've created and teach a comprehensive curriculum covering:- iOS and Android architecture- Application taxonomy- Penetration testing phases from a smartphone perspective- Static analysis techniques- Automated techniques and tools for mobile security testing- Working with security tests in mobile environments- Identifiable vulnerabilities and attack vectors in mobile applications-… Show more As both the instructor and content developer for the Mobile Hacking course, I've created and teach a comprehensive curriculum covering:- iOS and Android architecture- Application taxonomy- Penetration testing phases from a smartphone perspective- Static analysis techniques- Automated techniques and tools for mobile security testing- Working with security tests in mobile environments- Identifiable vulnerabilities and attack vectors in mobile applications- Dynamic analysis methods- Defense techniques for mobile applications- Reverse engineering APKs and IPAs- Personal security mechanisms for mobile devices- Corporate security solutions for mobile environments- Leveraging mobile devices as powerful tools for red teaming exercises and offensive security operationsThis course provides advanced training in mobile device security and ethical hacking. It covers everything from iOS and Android architecture to reverse engineering techniques for applications. The focus on static and dynamic analysis, along with vulnerability identification, prepares students to perform comprehensive penetration testing in mobile environments. Defense techniques and corporate security solutions address protection and mitigation aspects. The practical approach with hands-on labs ensures that students can apply their knowledge in real-world scenarios. Show less -
Cybersecurity And It Consultant, Cybersecurity And Digital Forensics SpecialistEstudio Jurídico Molinari & Asociados / Estudio Jurídico Impallari Feb 2021 - PresentRosario, Santa Fe, ArgentinaAs a Cybersecurity Consultant and Digital Forensics Specialist, I provide expert technical support and advisory services to prominent law firms, enhancing their cybersecurity posture and digital forensics capabilities. Key responsibilities and achievements include:• Conducted over 50 digital forensic examinations, uncovering crucial evidence that significantly impacted legal proceedings• Implemented network security measures that reduced potential vulnerabilities by 40%, enhancing… Show more As a Cybersecurity Consultant and Digital Forensics Specialist, I provide expert technical support and advisory services to prominent law firms, enhancing their cybersecurity posture and digital forensics capabilities. Key responsibilities and achievements include:• Conducted over 50 digital forensic examinations, uncovering crucial evidence that significantly impacted legal proceedings• Implemented network security measures that reduced potential vulnerabilities by 40%, enhancing overall firm data protection• Utilized Cellebrite UFED to extract and analyze data from 100+ mobile devices, providing critical evidence in high-profile cases• Performed memory forensics using the Volatility Framework, identifying hidden malware in 30% of examined systems• Employed advanced password decryption techniques, successfully accessing protected information in 85% of cases• Leveraged OSINT tools to gather intelligence on persons of interest, contributing to successful outcomes in 75% of investigations• Developed and delivered cybersecurity awareness training, resulting in a 60% decrease in successful phishing attemptsTechnical Proficiencies:• Digital Forensics: EnCase, FTK, Cellebrite UFED, Volatility Framework• Network Security: Wireshark, Nmap, Snort• Password Recovery: John the Ripper, Hashcat• OSINT: Maltego, Shodan, TheHarvester• Programming: Python, SQL, Java (for custom tool development)This role has significantly enhanced my expertise in digital forensics and cybersecurity within the legal sector, reinforcing my commitment to leveraging technology to support justice and protect sensitive information. Show less
-
Cyber Security SpecialistCenter For Cyber Security Studies & Research Apr 2024 - Jul 2024Jaipur, Rajasthan, IndiaAs a Cyber Security Specialist Intern at the Center for Cyber Security Studies & Research, I contributed to cutting-edge research and practical applications in the field of cybersecurity. My responsibilities included:- Assisting in vulnerability assessments and penetration testing of various systems and networks- Conducting research on emerging cyber threats and developing mitigation strategies- Participating in the development and implementation of security policies and… Show more As a Cyber Security Specialist Intern at the Center for Cyber Security Studies & Research, I contributed to cutting-edge research and practical applications in the field of cybersecurity. My responsibilities included:- Assisting in vulnerability assessments and penetration testing of various systems and networks- Conducting research on emerging cyber threats and developing mitigation strategies- Participating in the development and implementation of security policies and procedures- Analyzing security logs and incident reports to identify potential breaches or anomalies- Collaborating with senior researchers on projects related to network security, cryptography, and secure coding practices- Contributing to the creation of educational materials and training modules for cybersecurity awareness- Gaining hands-on experience with industry-standard security tools and frameworks- Participating in regular team meetings and presenting findings to senior staff membersThis internship provided valuable experience in real-world cybersecurity challenges and allowed me to apply theoretical knowledge in a practical setting, enhancing my skills in threat detection, analysis, and mitigation. Show less -
PentesterCfss Cyber & Forensics Security Solutions Mar 2024 - May 2024Bhagalpur, Bihar, India- Conducted vulnerability assessments and penetration tests on systems, web applications, and networks using various tools and techniques.- Performed manual and automated penetration testing to identify and exploit vulnerabilities in controlled environments.- Executed system enumeration, port scanning, and exploitation of known vulnerabilities using tools like Nmap, Metasploit, and custom scripts.- Carried out SQL injection, cross-site scripting (XSS), and other web hacking… Show more - Conducted vulnerability assessments and penetration tests on systems, web applications, and networks using various tools and techniques.- Performed manual and automated penetration testing to identify and exploit vulnerabilities in controlled environments.- Executed system enumeration, port scanning, and exploitation of known vulnerabilities using tools like Nmap, Metasploit, and custom scripts.- Carried out SQL injection, cross-site scripting (XSS), and other web hacking techniques to evaluate application security.- Implemented privilege escalation and lateral movement techniques to simulate advanced threats and assess internal defenses.- Analyzed system and network configurations to identify misconfigurations and vulnerabilities.- Documented findings in detail and provided recommendations for mitigating discovered vulnerabilities.- Participated in research on new attack techniques and development of penetration testing methodologies.- Collaborated on creating technical reports and presentations to communicate results to technical and non-technical teams.This experience allowed me to develop practical skills in offensive penetration testing, vulnerability analysis, and security consulting. Show less -
Cyber Security & Ethical Hacking InternCfss Cyber & Forensics Security Solutions Dec 2023 - Feb 2024Bhagalpur, Bihar, India- Gained hands-on experience in security analysis, research, and ethical hacking techniques, enhancing technical skills and broadening knowledge in cybersecurity.- Conducted vulnerability assessments and penetration tests on systems, networks, and applications to identify security weaknesses.- Performed security research to stay updated on emerging threats, vulnerabilities, and attack vectors.- Assisted in the development and implementation of security policies and procedures to… Show more - Gained hands-on experience in security analysis, research, and ethical hacking techniques, enhancing technical skills and broadening knowledge in cybersecurity.- Conducted vulnerability assessments and penetration tests on systems, networks, and applications to identify security weaknesses.- Performed security research to stay updated on emerging threats, vulnerabilities, and attack vectors.- Assisted in the development and implementation of security policies and procedures to improve overall organizational security posture.- Participated in threat modeling exercises to identify potential risks and recommend mitigation strategies.- Utilized various security tools and technologies for network scanning, vulnerability detection, and exploit development.- Contributed to the analysis of security incidents and helped develop incident response procedures.- Collaborated with the security team to create and deliver security awareness training materials for employees.- Assisted in the evaluation and testing of new security technologies and solutions.- Documented findings, prepared detailed technical reports, and presented results to senior team members.This internship provided valuable practical experience in the roles of Security Analyst, Researcher, and Ethical Hacker, significantly enhancing my technical skills and knowledge in the field of Cyber Security. Show less -
Cyber Security And Digital Forensics InternCyber Secured India Dec 2023 - Mar 2024Mumbai, Maharashtra, IndiaInternship Responsibilities:During my internship (from 20th Dec 2023 to 28th Feb 2024), I have the opportunity to gain practical experience and hands-on exposure in the Cybersecurity and Digital Forensics area.Structure of the Training and Internship Program:- Weekly 36 hours of training and internship- Attend recorded sessions and solve assignments.- Work on live projects- 4 hours on weekdays- 8 hours on weekends- Weekly assignments- Weekly project tasks -
Security Researcher / Bug Hunter / Ethical HackerBugcrowd Nov 2023 - Mar 2024As an ethical hacker at Bugcrowd, I identified and reported vulnerabilities to enhance system security across public and private programs. Key achievements and responsibilities:• Conducted comprehensive vulnerability assessments and penetration tests using industry-standard tools such as Burpsuite, Metasploit, SQLmap, and OWASP Zap• Utilized OSINT techniques and tools (Google Dorks, Maltego, theHarvester, Shodan) to gather critical intelligence on potential targets• Performed… Show more As an ethical hacker at Bugcrowd, I identified and reported vulnerabilities to enhance system security across public and private programs. Key achievements and responsibilities:• Conducted comprehensive vulnerability assessments and penetration tests using industry-standard tools such as Burpsuite, Metasploit, SQLmap, and OWASP Zap• Utilized OSINT techniques and tools (Google Dorks, Maltego, theHarvester, Shodan) to gather critical intelligence on potential targets• Performed network analysis and security audits using Nmap, Wireshark, Nessus, and Nuclei• Leveraged Linux OS for advanced ethical hacking activities and command-line operations• Provided detailed reports and actionable insights to organizations, helping improve their overall security posture• Consistently met program deadlines and maintained high-quality standards in vulnerability reportingThis role significantly enhanced my skills in ethical hacking, vulnerability assessment, and proactive security measures, reinforcing the importance of cybersecurity in today's digital landscape. Show less -
Pentester / Security ResearcherIntigriti Jun 2021 - Mar 2024BelgiumAs a Pentester and Security Researcher at Intigriti, I conducted comprehensive security evaluations of diverse computer systems and networks. Key responsibilities and achievements include:• Performed ethical hacking within defined scopes, identifying and exploiting vulnerabilities in web applications, mobile apps, and network infrastructures• Utilized a wide range of penetration testing tools and techniques to simulate real-world cyber attacks• Developed custom scripts and… Show more As a Pentester and Security Researcher at Intigriti, I conducted comprehensive security evaluations of diverse computer systems and networks. Key responsibilities and achievements include:• Performed ethical hacking within defined scopes, identifying and exploiting vulnerabilities in web applications, mobile apps, and network infrastructures• Utilized a wide range of penetration testing tools and techniques to simulate real-world cyber attacks• Developed custom scripts and exploits to uncover unique vulnerabilities• Produced detailed, actionable vulnerability reports, including clear steps for reproduction and mitigation strategies• Collaborated with program owners to validate findings and ensure proper remediation• Consistently ranked among top performers in various bug bounty programs• Stayed current with emerging cyber threats and attack vectors, continuously updating my skillsetThis role has significantly enhanced my expertise in offensive security techniques, vulnerability assessment, and secure coding practices, reinforcing my commitment to improving cybersecurity across diverse digital landscapes. Show less -
Security Researcher / Bug Hunter / Ethical HackerHackerone Jun 2019 - Mar 2024As a Security Researcher and Ethical Hacker at HackerOne, I conducted comprehensive security assessments and vulnerability research across diverse digital landscapes. Key achievements and responsibilities include:• Identified and responsibly disclosed critical vulnerabilities in web applications, mobile apps, and network infrastructures for Fortune 500 companies and government organizations• Consistently ranked in the top 1% of researchers on the platform, demonstrating exceptional… Show more As a Security Researcher and Ethical Hacker at HackerOne, I conducted comprehensive security assessments and vulnerability research across diverse digital landscapes. Key achievements and responsibilities include:• Identified and responsibly disclosed critical vulnerabilities in web applications, mobile apps, and network infrastructures for Fortune 500 companies and government organizations• Consistently ranked in the top 1% of researchers on the platform, demonstrating exceptional skills in discovering high-impact security flaws• Developed and implemented custom exploitation techniques to uncover unique vulnerabilities, often bypassing complex security measures• Produced detailed, actionable vulnerability reports with clear reproduction steps and effective mitigation strategies• Collaborated with development teams to validate findings and ensure proper remediation, significantly improving clients' security postures• Leveraged a diverse toolkit including Burpsuite, Metasploit, SQLMap, Nmap, Wireshark, and OWASP ZAP to conduct thorough penetration tests and security audits• Utilized Linux-based systems for advanced ethical hacking activities and custom tool development• Stayed at the forefront of emerging cyber threats and attack vectors, continuously updating skills and methodologiesThis role has significantly enhanced my expertise in offensive security techniques, vulnerability assessment, and secure coding practices. It has reinforced my commitment to improving cybersecurity across diverse digital ecosystems and contributing to a safer online environment. Show less -
Cybersecurity Consultant/Pentester, System & Network AdministrationFreelance (Self Employed) May 2001 - Feb 2024Rosario, Santa Fe, ArgentinaAs a versatile IT professional, I've provided comprehensive technical consulting services to a diverse clientele for over two decades. Key achievements and responsibilities include:• Developed and implemented custom software solutions, including management systems, data applications, and web-based platforms, using C, C++, C#, Python, Java, .NET, and JavaScript• Designed and maintained secure databases using RDBMS, ensuring data integrity and confidentiality• Optimized network… Show more As a versatile IT professional, I've provided comprehensive technical consulting services to a diverse clientele for over two decades. Key achievements and responsibilities include:• Developed and implemented custom software solutions, including management systems, data applications, and web-based platforms, using C, C++, C#, Python, Java, .NET, and JavaScript• Designed and maintained secure databases using RDBMS, ensuring data integrity and confidentiality• Optimized network infrastructures, including wireless networks, using advanced tools like GNS3, Cisco VIRL and Packet Tracer for simulation and proactive issue resolution• Conducted penetration tests and security audits, identifying vulnerabilities and implementing robust security measures including firewalls, IDS, and data encryption• Deployed and configured web servers, ensuring optimal performance and reliable access• Utilized virtualization technologies to create scalable and cost-effective testing and deployment environments• Performed system maintenance and network administration tasks, ensuring smooth operations for clients across various industriesThroughout my career, I've consistently adapted to evolving technologies and cybersecurity threats, providing tailored IT solutions that balance functionality, security, and cost-effectiveness. This role has been instrumental in my professional growth, allowing me to develop a unique blend of software development, network administration, and cybersecurity expertise. Show less -
Software DeveloperUpwork Jan 2018 - Mar 2023RemoteAs a freelance Software Developer on Upwork, I specialized in developing, optimizing, and maintaining high-performance web applications and services. Key achievements and responsibilities include:• Developed and maintained robust web applications using JavaScript, Python, Java, and SQL, ensuring high-quality, scalable solutions for diverse clients• Implemented performance monitoring strategies using tools like New Relic and Datadog, resulting in a 30% improvement in application… Show more As a freelance Software Developer on Upwork, I specialized in developing, optimizing, and maintaining high-performance web applications and services. Key achievements and responsibilities include:• Developed and maintained robust web applications using JavaScript, Python, Java, and SQL, ensuring high-quality, scalable solutions for diverse clients• Implemented performance monitoring strategies using tools like New Relic and Datadog, resulting in a 30% improvement in application response times• Conducted comprehensive load testing with Apache JMeter and Gatling, enhancing application scalability to handle 200% more concurrent users• Utilized advanced debugging techniques with Chrome Developer Tools and Firebug, reducing bug resolution time by 40%• Managed version control efficiently using Git, facilitating seamless collaboration in distributed teams and maintaining code integrity• Optimized code performance using profiling tools like Xdebug and Blackfire, achieving a 25% reduction in server resource usage• Led code reviews using GitHub Pull Requests and Bitbucket, improving overall code quality and fostering knowledge sharing within teams• Integrated security best practices into the development lifecycle, enhancing the overall cybersecurity posture of applications• Consistently maintained a 5-star rating on Upwork, with 100% client satisfaction across all projectsThis role significantly enhanced my full-stack development skills, performance optimization techniques, and ability to deliver high-quality software solutions in a freelance environment. It reinforced my commitment to creating efficient, secure, and scalable web applications. Show less -
Red Team Specialist / Penetration TesterCustodia Vip Avaro May 2017 - Nov 2022Rosario, Santa Fe, ArgentinaAs a Red Team Specialist and Penetration Tester, I led comprehensive adversary simulations and security assessments for organizational and high-profile individual clients. Key responsibilities and achievements include:• Conducted full-scope red team operations, simulating advanced persistent threats (APTs) to test client defenses across multiple attack vectors• Executed sophisticated social engineering campaigns, including phishing, vishing, and physical infiltration attempts to assess… Show more As a Red Team Specialist and Penetration Tester, I led comprehensive adversary simulations and security assessments for organizational and high-profile individual clients. Key responsibilities and achievements include:• Conducted full-scope red team operations, simulating advanced persistent threats (APTs) to test client defenses across multiple attack vectors• Executed sophisticated social engineering campaigns, including phishing, vishing, and physical infiltration attempts to assess human vulnerabilities• Performed in-depth threat modeling to identify high-value targets and develop tailored attack scenarios• Utilized cutting-edge tools and custom-developed exploits to bypass security controls and maintain persistent access• Conducted covert post-exploitation activities, including lateral movement, privilege escalation, and data exfiltration• Implemented advanced evasion techniques to avoid detection by security monitoring systems• Provided detailed adversary emulation reports, including attack paths, tactics used, and strategic recommendations for improving overall security posture• Developed and delivered red team training programs to enhance internal security teams' threat hunting and incident response capabilities• Continuously researched emerging threats and attack methodologies to refine red team tactics and stay ahead of evolving adversary techniquesThis role significantly enhanced my expertise in advanced offensive security techniques, adversary emulation, and holistic security assessment, reinforcing my ability to provide comprehensive red team services in complex threat environments. Show less
Sebastian Gil Education Details
-
In Progress -
Completed -
Complete -
Completed -
Completed -
Completed -
97.50 -
Universidad Nacional De RafaelaMechatronics, Robotics, And Automation -
Instituto Politecnico Superior RosarioCompleted -
CepecDiseño Grafico E Industrial -
IshyrPublic Relations, Advertising, And Applied Communication -
In Progress
Frequently Asked Questions about Sebastian Gil
What company does Sebastian Gil work for?
Sebastian Gil works for Vicxer
What is Sebastian Gil's role at the current company?
Sebastian Gil's current role is Offensive Security Expert & Instructor | Cybersecurity Engineer | OSINT Specialist | Security Researcher @ Vicxer | Cisco Insider Champion 2024.
What schools did Sebastian Gil attend?
Sebastian Gil attended University Of Maryland, Universidad Nacional De Rosario - Unr, Harvard Online, Udacity, Harvard Online, Harvard Online, Harvard Online, Charles Sturt University, Charles Sturt University, Coursera, Coursera, Coursera, Coursera, Universidad Nacional De Rafaela, Instituto Politecnico Superior Rosario, Cepec, Ishyr, Alura, Harvard Online.
Not the Sebastian Gil you were looking for?
-
Sebastián Gil
Diseñador Gráfico / Diseñador Web. Iniciador De Sg Soluciones Gráficas Y Estación Visual.Argentina -
Sebastián Gil
Argentina -
2gmail.com, socialnet.com.ar
-
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial