Paul Urian

Paul Urian Email and Phone Number

Threat Researcher @ Crowdstrike
sunnyvale, california, united states

Paul Urian's Current Company Details

crowdstrike.com

Crowdstrike

Threat Researcher
sunnyvale, california, united states
Website:
crowdstrike.com
Employees:
2863
Industry:
Computer & Network Security
I graduated at: "Mihai Viteazul" Military High School, Alba Iulia; Military Technical Academy, the Faculty of Electronics, Computer science, Bucharest; Security of Information Technology master's program, Military Technical Academy, Bucharest.I'm passionate about cyber security, I like to analyze and study malware behaviour. Malware analysis, malware behaviour analysis, x86 architecture, disassemblers/debuggers; Reverse engineering, Windows API, Working with malware in a safe environment, Malicious documents analyzing. CTF competitions, hackthebox.eu passionate.

Paul Urian Work Experience

  • crowdstrike.com
    Software Engineer
    Ministry Of National Defence Jul 17 - Aug 18 · 1 yr 1 mo
    Lisbon, Lisbon, Portugal
  • crowdstrike.com
    Software Engineer
    Teamshare - E-Commerce Experts Feb 18 - Jul 18 · 5 mos
    Bucharest, Bucuresti, Romania
    * E-commerce platform * I worked as a backend developer * C#/SQL Server.
  • crowdstrike.com
    Software Engineer
    Trans Sped Aug 19 - Dec 19 · 4 mos
    Bucharest, Bucuresti, Romania
    * I developed a mobile application used for remote electronic signature creation against PDF documents. * Remote electronic signatures, which use a special designed web service to compute the electronic signature, started to replace classic electronic signatures, which were computed using a physical device, like usb tokens/ smart cards. * That application uses a web service api (developed according Cloud Signature Consortium specification and eIDAS standard) for electronic signature creation. There is no need of USB tokens or smart cards. * Technologies used: * Java * for Android OS application development. * C# (Xamarin Forms) * for Android/iOS OS application development. * Secure BlackBox library. * Documentation: * Cloud Signature Consortium specification. * eIDAS Regulation
  • crowdstrike.com
    Threat Researcher
    Crowdstrike Oct 21 - Present · 3 yrs 4 mos
    Remote, Alaska, United States
    Research new malware families, study, document, have team presentations and if required, write blogs on new malware findings and behaviour.Reverse engineer malicious samples written in different programming languages like: C, C++, C#, Rust, Golang.Analyse malicious scripts /documents.Review and develop detections for malicious samples.Build corpus for ML training.Develop tools (mostly in python) to assist with automation of analysis tasks.
  • crowdstrike.com
    Reverse Engineer - Malware Analyst
    Ministry Of National Defence Aug 18 - Jul 20 · 1 yr 11 mos
    Lisbon, Lisbon, Portugal
    * I worked as a malware analyst in the malware analysis office and I was a member of the Incident Response Team. * I enjoyed: * creating a safe environment for malware analysis, basic analysis * Analysing PE header (Timestamp, Import Address Table, PE sections, Linked libraries and functions etc) * Extracting indicators of compromise * Advanced analysis: x86/x64 assembly programming language * Windows API, Windows Registry, Networking APIs, Kernel/user mode * Reverse engineering: IDA Pro – Hex Rays, Ghidra * Packers * Dynamic analysis, Debugging with OllyDbg, WinDbg, x64dbg * Malicious documents analysis.
  • crowdstrike.com
    Information Security Analyst
    Bitdefender Jul 20 - Oct 21 · 1 yr 3 mos
    Romania
    Performing daily operational activities ('eyes on glass') for real-time monitoring and analysis of security events from multiple sources, including but not limited to SIEM events, network or system IDS systems, firewall logs, system logs (Linux, Windows, MacOS), applications and databases.Being an active member of Computer Emergency Response Team - detecting, investigating, solving and documenting security incidents - fixing false positives and improving detections.Creating security reports, creating, reviewing and improving Splunk alerts, automation scripts, dashboards, and other internal systems detections.

Paul Urian Education

Other Similar Profiles

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.

Frequently Asked Questions about Paul Urian

What company does Paul Urian work for?

Paul Urian works for Crowdstrike

What is Paul Urian's role in his/her workplace?

Paul Urian's role in his/her workplace is Threat Researcher.

Which industry does Paul Urian work in currently?

Paul Urian works in the industry Computer & Network Security.

What schools did Paul Urian attend?

Paul Urian attended Academia Tehnica Militara, Academia Tehnica Militara. and Academia Tehnica Militara.

Who are Paul Urian's colleagues?

Paul Urian's colleagues are Forrest Isenhour, Forrest Isenhour, Travis Huddleston, Travis Huddleston, Manoj Aggarwal, Manoj Aggarwal, Seth Jerz, Seth Jerz, Jackson Mcarthur, Jackson Mcarthur, and Connor Neal. and Praveena Korrapati.

Who are Paul Urian's peers at other companies?

Paul Urian's peers at other companies are Paolo Jacome, Ali Shakoori, Ben Finegold, Omkar Deshmukh, Larry Smith, and David Tucker. and Venkadesh Thambi. Paul Urian's peers at other companies are Paolo Jacome, Ali Shakoori, Ben Finegold, Omkar Deshmukh, Larry Smith, and David Tucker. and Venkadesh Thambi.