Industry Expertise Options:
[{"label":"Adobe","value":"Adobe"},{"label":"Amazon Web Services (AWS)","value":"Amazon Web Services (AWS)"},{"label":"Arista Networks","value":"Arista Networks"},{"label":"Atlassian","value":"Atlassian"},{"label":"Box","value":"Box"},{"label":"Broadcom","value":"Broadcom"},{"label":"Check Point Software","value":"Check Point Software"},{"label":"Cisco","value":"Cisco"},{"label":"Citrix Systems","value":"Citrix Systems"},{"label":"Dell Technologies","value":"Dell Technologies"},{"label":"DocuSign","value":"DocuSign"},{"label":"Elastic NV","value":"Elastic NV"},{"label":"Epic Systems","value":"Epic Systems"},{"label":"F5 Networks","value":"F5 Networks"},{"label":"Fortinet","value":"Fortinet"},{"label":"Google","value":"Google"},{"label":"HP (Hewlett-Packard)","value":"HP (Hewlett-Packard)"},{"label":"HubSpot","value":"HubSpot"},{"label":"IBM","value":"IBM"},{"label":"Informatica","value":"Informatica"},{"label":"Intuit","value":"Intuit"},{"label":"Juniper Networks","value":"Juniper Networks"},{"label":"Micro Focus","value":"Micro Focus"},{"label":"MongoDB","value":"MongoDB"},{"label":"MuleSoft","value":"MuleSoft"},{"label":"NetApp","value":"NetApp"},{"label":"New Relic","value":"New Relic"},{"label":"OpenText","value":"OpenText"},{"label":"Oracle","value":"Oracle"},{"label":"Palo Alto Networks","value":"Palo Alto Networks"},{"label":"Progress Software","value":"Progress Software"},{"label":"Qualys","value":"Qualys"},{"label":"Red Hat","value":"Red Hat"},{"label":"Salesforce","value":"Salesforce"},{"label":"SAP","value":"SAP"},{"label":"SAS Institute","value":"SAS Institute"},{"label":"ServiceNow","value":"ServiceNow"},{"label":"Shopify","value":"Shopify"},{"label":"Snowflake","value":"Snowflake"},{"label":"SolarWinds","value":"SolarWinds"},{"label":"Splunk","value":"Splunk"},{"label":"Square (Block, Inc.)","value":"Square (Block, Inc.)"},{"label":"Symantec","value":"Symantec"},{"label":"Tableau Software","value":"Tableau Software"},{"label":"Trend Micro","value":"Trend Micro"},{"label":"VMware","value":"VMware"},{"label":"Workday","value":"Workday"},{"label":"Zoom Video Communications","value":"Zoom Video Communications"},{"label":"Zuora","value":"Zuora"}]
Description:
My first contact with computer security was a master's degree done in Kungliga Tekniska Högskolan (KTH) in Stockholm, done as a double degree between my home university (Universidad Politecnica de Madrid) and KTH.
For four years I have been security evaluator with Common Criteria and ITSEC normative, evaluating software and hardware products. These products implemented different security mechanisms, some of evaluated products were cipher machines, authentication and identification servers, microcontrollers/smart cards and aeronautic servers and stations.
After these four years, I have been working as Airbus consultant. In this period, I devised security documentation of systems, penetration testing, security configuration guidelines and vulnerability analysis among other activities.
I leaved Airbus to create a company to develop security products, a vulnerability analyser.
At the same time, I have been doing my PhD in the field of smart card and other embedded devices security, creating a toolbox to devise side channel attacks.
Skill Seniority:
[{"skill":"HW requirements analysis","seniority":"Middle"},{"skill":"SW requirements analysis","seniority":"Senior"},{"skill":"Security architecture & design","seniority":"Senior"},{"skill":"UML process modelling","seniority":"Senior"},{"skill":"Business security","seniority":"Middle"},{"skill":"IT Security","seniority":"Senior"},{"skill":"C","seniority":"Middle"},{"skill":"C++","seniority":"Middle"},{"skill":"Java","seniority":"Middle"},{"skill":"Security administration","seniority":"Middle"}]