Valentina Costa Gazcón

Valentina Costa Gazcón Email and Phone Number

Blue Team Operator Teacher @ Ekoparty Hackademy
Buenos Aires Province, Argentina
Valentina Costa Gazcón's Location
Buenos Aires, Buenos Aires Province, Argentina, Argentina
About Valentina Costa Gazcón

I am the CEO & Founder of V·ONE Labs. As someone who has spent years in the cybersecurity industry, I am acutely aware of the constant and evolving risks faced by businesses of all sizes. That's why I wrote "Practical Threat Intelligence and Data-Driven Threat Hunting," a book that provides cybersecurity professionals with unique insights into identifying and neutralizing threats in a data-driven manner.Find my book at: https://www.amazon.com/Practical-Threat-Hunting/dp/1838556370

Valentina Costa Gazcón's Current Company Details
Ekoparty Hackademy

Ekoparty Hackademy

View
Blue Team Operator Teacher
Buenos Aires Province, Argentina
Website:
ekoparty.org
Employees:
43
Valentina Costa Gazcón Work Experience Details
  • Ekoparty Hackademy
    Blue Team Operator Teacher
    Ekoparty Hackademy
    Buenos Aires Province, Argentina
  • V
    Founder
    V 2023 - Present
    Safety Harbor, Florida, Us
  • Bluespacesec
    Organizer
    Bluespacesec Mar 2020 - Present
    * Plan, organize, and execute the BlueSpace conference within the Ekoparty* Research and identify relevant industry trends and topics to create engaging agendas and speaker lineups* Coordinate with internal and external stakeholders, including sponsors, vendors, and attendees, to ensure seamless event execution* Manage event budgets, timelines, and logistics* Oversee marketing and promotional activities to drive attendance and engagement* Monitor and evaluate event feedback and analytics to inform future event planning and strategy
  • Versprite Cybersecurity
    Director Of Threat Intelligence
    Versprite Cybersecurity Sep 2022 - Jan 2023
    Atlanta, Ga, Us
    * Implemented reporting standards* Implemented communication standards* Elaborated team structure and strategy* Implemented task tracking structure and dashboards using ClickUp* Established and designed PagerDuty on-call schedule* Established reporting cadence and presentation standards in client-facing engagements* Designed threat hunting lab and program* Provided direction to the engineering team in the development of features and playbooks within SOAR Platform* Evaluated the team, setting performance goals and making decisions on promotions and terminations based on their achievements* Manage client communications
  • Marqeta, Inc
    Threat Operations Manager
    Marqeta, Inc Jan 2021 - Aug 2022
    Oakland, California, Us
    * Designed purple team structure and workflows.* Designed threat hunting team' structure and workflows.* Designed threat intelligence team' structure and workflows.* Designed risk management procedures within the scope of vulnerability management.* Designed vulnerability management program.* Elaborated on-call framework.* Interviewed, demoed and negotiated with security vendors.* Trained reports in threat intelligence concepts.* Trained reports in threat profiling.* Elaborated threat intellingence analysis for upper management around the cybersecurity landscape and other related topics.* Elaborated threat intelligence briefings for the security team.* Set up a threat intelligence platform & configured threat intellingence feeds.
  • Deloitte Argentina
    Senior Cyber Threat Intelligence Analyst At Threat Library Team
    Deloitte Argentina Jul 2019 - Aug 2020
    Worldwide, Oo
    Management of honeypot platformDevelopment and maintenance of Threat Library portalQuality Assurance process in Threat Library platformTraining new team members
  • Deloitte Argentina
    Cyber Threat Intelligence Analyst At Threat Library Team
    Deloitte Argentina May 2018 - Jul 2019
    Worldwide, Oo
    Cyber Threat IntelligenceTracking APTs worldwide using ATTACK Framework to analyze their Tools, Tactics and TechniquesDesign and Implementation of Quality Assurance ProcessIndicators of Compromise HuntingDesign and Development of Honeypot PlatformPython programmingPlatforms: Atlassian Jira & ConfluenceOther technologies used: PostgreSql, MongoDB, Docker, ELK, FLASK, HTML, CSS
  • Public Speaker
    Deepintel
    Public Speaker Nov 2019 - Nov 2019
    The DNS BunchA closer look to the techniques used by the threat actors that use DNS Attacks. Reviewing overlaps among them and the different techniques used by state sponsored threat actors vs criminal threat actors. Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
  • Public Speaker
    Deepsec
    Public Speaker Nov 2019 - Nov 2019
    Once Upon a Time in the West - A Story on DNS AttacksJust like in movies about the Old West, we are going through a land riddled with well-known gunmen –OceanLotus, DNSpionage, and OilRig, among others – who roam at ease while the security cowboys sleep. This presentation will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest techniques discovered to improve detection and dodge the bullets the bad guys are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
  • Public Speaker
    Mitre Att&Ckcon
    Public Speaker Oct 2019 - Oct 2019
    Raiders of the Mitre Framework: How to Build Your Own Threat LibraryIt's the year 2019 and the internet has been around long enough to be filled with what seems to be "ancient" data. Digging through, classifying and analyzing everything sometimes makes you feel a lot like Indiana Jones searching for the right clues in a moving puzzle. But how could you move through the caves without getting buried under piles of data rubble? How might anyone revisit and study the data from the past to transform it into actionable information for the present? In this talk we are going to show you how a threat intel Indiana Jones analyst should tackle these issues in order to find the treasure of the Threat Library. We will show you how we used the MITRE ATT&CK Framework as our book of secrets for turning dusty old Internet artifacts into a library of actionable Threat Intelligence.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
  • Public Speaker
    Nerdearla
    Public Speaker Oct 2019 - Oct 2019
    Cyber Kung Fu – Una mirada a la ciberseguridad como método de defensa personal“No vuelvas tarde”, “No andes sola por ahí de noche”, “Tené cuidado, pedí que alguien te acompañe”. Son todas las cosas que me decía-y todavía me dice-mi mamá y que sigo escuchando en mi cabeza cada vez que salgo. Desde chiquitas nos inculcan a tomar precauciones, a cuidarnos. Pero nadie nos dijo nunca “Usa una buena contraseña” o “No abras cualquier link” y sin embargo, casi todos tenemos un smartphone.La brecha entre la seguridad digital y la física parece enorme, las consecuencias lo parecen también. Sin embargo, la vida en la era digital no está exenta de peligros.Con esta charla queremos mostrar la importancia de conocer las repercusiones de nuestra huella digital y qué es lo que podemos hacer para protegernos con el objetivo último de demostrar que no es necesario convertirse en un experto en ciberseguridad para aprender defenderse.
  • Instructor
    Ekoparty Security Conference
    Instructor Sep 2019 - Sep 2019
    Alice in Malwareland: Falling into the Threat Intelligence Rabbit Hole It all started when Alice, a cybersecurity analyst, was sitting in her office reading a boring manual about the ISO 27001. Suddenly, Bad Rabbit appears in her monitoring system, dressed in like a ransomware and running for self-distribution through the company’s internal network watching its crypto wallet grow. Alice immediately had a keen interest in him and followed him to his burrow.The burrow turned out to be a deeper tunnel than what she thought filled with seemingly meaningless logs, through which Alice fell while trying to remember the intelligence cycle and the analysis techniques she learned along the way, not knowing if one day she will reach the bottom. Finally, Alice arrives in an environment full of false tracks. The rabbit does is nowhere to be found and she only sees a file that says "ENABLE MACROS". Without thinking twice, she agrees to activate its execution and, in front of her eyes, the files get encrypted at full speed. Alice will have to perform an analysis of the access door that Bad Rabbit used in order to reach him, discover his motivations and have him bring her before the kings of the deck to recover her files.Like the Alice in our history, in this course we will immerse ourselves in the day-to-day life of an intelligence analyst, analyzing examples of real attacks with the help of the recognized MITRE ATT&CK framework and other open source tools that you can use to conduct your own analysis. Once the training is finished, the participants will have learned to differentiate different types of threats, the different phases of an attack in a targeted campaign, how to collect indicators of compromise, and how to carry out an analysis of the information collected. All these tools will provide them with the necessary bases to implement defense strategies based on the previous analysis of the threats that organizations face.Ruth Esmeralda Barbacil and Valentina Palacin
  • Public Speaker
    Sans Threat Hunting Summit
    Public Speaker Jul 2019 - Jul 2019
    Once Upon a Time in the West - A Story on DNS AttacksJust like in movies about the Old West, we are going through a land riddled with well-known gunmen –OceanLotus, DNSpionage, and OilRig, among others – who roam at ease while the security cowboys sleep. This presentation will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest techniques discovered to improve detection and dodge the bullets the bad guys are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
  • Public Speaker
    Typhoon 2019
    Public Speaker Jun 2019 - Jun 2019
    Once Upon a Time in the West – A story on DNS Attacks Just like in Old West movies, we are going through a land riddle with well-known gunmen: OceanLotus, DNSpionage and OilRig, who roam at ease, while the security cowboys sleep. This presentation will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and their behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest discovered techniques in order to improve detections to dodge the bullets they are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
  • Public Speaker
    Owasp Global Appsec Tel Aviv
    Public Speaker May 2019 - May 2019
    Once Upon a Time in the West - A Story on DNS Attacks Just like in Old West movies, we will go through a mysterious land with the well-known gunmen OceanLotus, DNSpionage, and OilRig, who roam at ease while security cowboys sleep. This talk will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and their behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest techniques in order to improve detection and dodge the bullets they are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
  • Public Speaker
    Phdays 9
    Public Speaker May 2019 - May 2019
    Just like in Old West movies, we will go through a mysterious land with the well-known gunmen OceanLotus, DNSpionage, and OilRig, who roam at ease while security cowboys sleep. This talk will uncover the toolset and techniques used by these gunmen, taking a closer look at their big guns and their behavioral patterns. We will explore the attacks involving DNS that took place during the last decade to examine the latest techniques in order to improve detection and dodge the bullets they are firing in our direction.Ruth Esmeralda Barbacil, Cyber Intelligence Analyst, DeloitteValentina Palacin, Cyber Intelligence Analyst, Deloitte
  • Cardinal Worldwide Services
    Jr Back-End Developer And Dba
    Cardinal Worldwide Services May 2017 - May 2018
    Comuna 4, Ciudad Autónoma De Buenos Aires, Ar
    Software development using Visual Basic and SQLDatabase maintenance HelpDesk
  • Lenovo
    Web Developer
    Lenovo May 2016 - Jan 2017
    Morrisville, Nc, Us
    Lenovo’s E-commerce platform maintenance and development.
  • Spg - Spanish Publishing Group
    Translator And Proofreader (Freelancer)
    Spg - Spanish Publishing Group Jun 2011 - Apr 2016
    Translation and Proofreading of English text books from English to Spanish and vice versa for School Publishing Group and other publishers.
  • Adgourmet
    Campaign Manager
    Adgourmet Sep 2014 - Dec 2015
    Google Adwords and Facebook campaigns planning and deploymentWeb Development focusing in SEO and UIMonthly evaluations reports for clients

Valentina Costa Gazcón Education Details

  • Málaga University
    Málaga University
    Translation
  • National Technological University
    National Technological University
    Information Security
  • Cema University
    Cema University
    Computer Engineering
  • Escuela Da Vinci
    Escuela Da Vinci
    Web Development
  • Instituto Mc. Donough De Interpretación Simultánea
    Instituto Mc. Donough De Interpretación Simultánea
    Translation

Frequently Asked Questions about Valentina Costa Gazcón

What company does Valentina Costa Gazcón work for?

Valentina Costa Gazcón works for Ekoparty Hackademy

What is Valentina Costa Gazcón's role at the current company?

Valentina Costa Gazcón's current role is Blue Team Operator Teacher.

What schools did Valentina Costa Gazcón attend?

Valentina Costa Gazcón attended Málaga University, National Technological University, Cema University, Escuela Da Vinci, Instituto Mc. Donough De Interpretación Simultánea.

Who are Valentina Costa Gazcón's colleagues?

Valentina Costa Gazcón's colleagues are Juliana Hormachea, Nahuel Acevedo, Nadia Pouchán, Mora Miranda, Ornella Paturzo Vanni, Aldana Torres, Jorge Manquian.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.