
Paul Urian Email and Phone Number
Paul Urian's Current Company Details

Crowdstrike
- Website:
- crowdstrike.com
- Employees:
- 2863
- Industry:
- Computer & Network Security
Paul Urian Work Experience
-
-
Software EngineerTeamshare - E-Commerce Experts Feb 18 - Jul 18 · 5 mosBucharest, Bucuresti, Romania* E-commerce platform * I worked as a backend developer * C#/SQL Server.
-
Software EngineerTrans Sped Aug 19 - Dec 19 · 4 mosBucharest, Bucuresti, Romania* I developed a mobile application used for remote electronic signature creation against PDF documents. * Remote electronic signatures, which use a special designed web service to compute the electronic signature, started to replace classic electronic signatures, which were computed using a physical device, like usb tokens/ smart cards. * That application uses a web service api (developed according Cloud Signature Consortium specification and eIDAS standard) for electronic signature creation. There is no need of USB tokens or smart cards. * Technologies used: * Java * for Android OS application development. * C# (Xamarin Forms) * for Android/iOS OS application development. * Secure BlackBox library. * Documentation: * Cloud Signature Consortium specification. * eIDAS Regulation
-
Threat ResearcherCrowdstrike Oct 21 - Present · 3 yrs 4 mosRemote, Alaska, United StatesResearch new malware families, study, document, have team presentations and if required, write blogs on new malware findings and behaviour.Reverse engineer malicious samples written in different programming languages like: C, C++, C#, Rust, Golang.Analyse malicious scripts /documents.Review and develop detections for malicious samples.Build corpus for ML training.Develop tools (mostly in python) to assist with automation of analysis tasks.
-
Reverse Engineer - Malware AnalystMinistry Of National Defence Aug 18 - Jul 20 · 1 yr 11 mosLisbon, Lisbon, Portugal* I worked as a malware analyst in the malware analysis office and I was a member of the Incident Response Team. * I enjoyed: * creating a safe environment for malware analysis, basic analysis * Analysing PE header (Timestamp, Import Address Table, PE sections, Linked libraries and functions etc) * Extracting indicators of compromise * Advanced analysis: x86/x64 assembly programming language * Windows API, Windows Registry, Networking APIs, Kernel/user mode * Reverse engineering: IDA Pro – Hex Rays, Ghidra * Packers * Dynamic analysis, Debugging with OllyDbg, WinDbg, x64dbg * Malicious documents analysis.
-
Information Security AnalystBitdefender Jul 20 - Oct 21 · 1 yr 3 mosRomaniaPerforming daily operational activities ('eyes on glass') for real-time monitoring and analysis of security events from multiple sources, including but not limited to SIEM events, network or system IDS systems, firewall logs, system logs (Linux, Windows, MacOS), applications and databases.Being an active member of Computer Emergency Response Team - detecting, investigating, solving and documenting security incidents - fixing false positives and improving detections.Creating security reports, creating, reviewing and improving Splunk alerts, automation scripts, dashboards, and other internal systems detections.
Paul Urian Education
-
Masters 2017 - 2019
-
Computer Engineering 2013 - 2017
Other Similar Profiles
-
1ledger.fr
-
-
Ben Finegold
Austin, Texas, United States3forcepoint.com, forcepoint.com, imperva.com -
Omkar Deshmukh
Software Engineer Intern
Jaipur, Rajasthan, India -
Larry Smith
Security Engineer For Secure Sdlc, Application Security Solutions
Atlanta, Georgia, United States -
David Tucker
Director
Guildford, Surrey, United Kingdom2vssecurityproducts.com, veritysystems.com -
Venkadesh Thambi
Technical Specialist
Kanniyakumari, Tamil Nadu, India
Not the Paul Urian you were looking for?
-
-
-
-
3everymatrix.com, gmail.com, renault.com
-
-
1charter.net
-
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trialFrequently Asked Questions about Paul Urian
What company does Paul Urian work for?
Paul Urian works for Crowdstrike
What is Paul Urian's role in his/her workplace?
Paul Urian's role in his/her workplace is Threat Researcher.
Which industry does Paul Urian work in currently?
Paul Urian works in the industry Computer & Network Security.
What schools did Paul Urian attend?
Paul Urian attended Academia Tehnica Militara, Academia Tehnica Militara. and Academia Tehnica Militara.
What is Paul Urian's role in his workplace?
Paul Urian has skills like Electronic Signatures, Computer Forensics, Design Patterns, Static Analysis, Debugging, Cybersecurity Incident Response, Object Oriented Programming, Pe Header, Reverse Engineering, Angular, Web Development, Android Development, C (Programming Language, Ollydbg, Pki, Ida Pro, C++, Malware Detection, Cryptography, Digital Signatures, X86 Assembly, Malware Analysis, C#, Public Key Cryptography, and Internet Protocol Suite.
Who are Paul Urian's colleagues?
Paul Urian's colleagues are Forrest Isenhour, Forrest Isenhour, Travis Huddleston, Travis Huddleston, Manoj Aggarwal, Manoj Aggarwal, Seth Jerz, Seth Jerz, Jackson Mcarthur, Jackson Mcarthur, and Connor Neal. and Praveena Korrapati.
Who are Paul Urian's peers at other companies?
Paul Urian's peers at other companies are Paolo Jacome, Ali Shakoori, Ben Finegold, Omkar Deshmukh, Larry Smith, and David Tucker. and Venkadesh Thambi. Paul Urian's peers at other companies are Paolo Jacome, Ali Shakoori, Ben Finegold, Omkar Deshmukh, Larry Smith, and David Tucker. and Venkadesh Thambi.