Michael Sikorski

CTO

New York, New York, United States26 yrs 1 mo experience
Most Likely To SwitchAI Enabled

Key Highlights

  • Over 25 years of cybersecurity experience
  • Author of Practical Malware Analysis
  • Expert in AI security and policy
Stackforce AI infers this person is a Cybersecurity expert with extensive experience in threat intelligence and AI-driven solutions.

Contact

Skills

Core Skills

CybersecurityThreat IntelligenceProduct Management

Other Skills

EngineeringAI AutomationDigital Platform DevelopmentAI SecurityPublic SpeakingMalware AnalysisTeachingCurriculum DevelopmentThreat Intelligence SharingCollaborationStrategic PlanningTechnical AdvisoryResearch and DevelopmentIncident ResponseTeam Management

About

Michael Sikorski is the CTO for Unit 42 at Palo Alto Networks, leading the Engineering, Product, and Threat Intelligence teams. Previously at Mandiant and the NSA, Mike has over 25 years of experience in cybersecurity, most of it responding to high-profile incidents and leading high-performing teams. Combining a deep background in reverse engineering as the author of Practical Malware Analysis with AI security expertise that includes congressional testimony, Mike brings a unique breadth of experience, spanning hands-on technical analysis to advising on security policy at the highest levels of government and corporate leadership. Committed to advancing the field through education and industry-wide collaboration, Mike teaches cybersecurity at Columbia University and serves on the Board of Directors for the Cyber Threat Alliance.

Experience

Cyber threat alliance

Board Member

Jun 2023Present · 2 yrs 9 mos · New York, New York

  • The Cyber Threat Alliance (CTA) is a coalition of cybersecurity companies committed to sharing threat information in order to enhance collective defenses around the world. As a board member, I help foster actionable threat intelligence sharing, drive new member recruitment, and contribute to a roadmap that increases collaboration through process and technology.
Threat Intelligence SharingCollaborationStrategic PlanningCybersecurity

Palo alto networks unit 42

CTO & VP of Engineering

May 2022Present · 3 yrs 10 mos · New York, New York

  • Leads the Unit 42 Engineering, Product, and Threat Intelligence teams. Scaling Unit 42 into the industry leader by automating service delivery with AI and building a world-class threat intelligence business.
  • Engineering & AI Innovation
  • ▪️Intelligence Integration: Orchestrated a modernization of Palo Alto Networks’ telemetry architecture and threat tracking, enabling Unit 42 visibility across the product portfolio.
  • ▪️Agentic Transformation: Architecting GenAI-driven automation for business operations and Incident Response workflows to increase operational scale and speed.
  • ▪️Client Command Center: Developed and launched an external-facing digital platform, taking it from concept to global client adoption for centralized consulting engagements and threat intelligence delivery.
  • Strategic Advisory & Product
  • ▪️AI & Policy Leadership: Industry expert on AI security and adversarial AI; evidenced by congressional testimony and keynote addresses at industry forums.
  • ▪️Executive Advisory: Strategic technical partner to the global sales organization, personally conducting 100+ CISO-level briefings annually to align global defensive postures with Unit 42’s intelligence and Palo Alto Networks’ product portfolio.
  • ▪️Market Leadership: Drove strategic initiatives such as securing Unit 42’s first ever Forrester Leader category for Incident Response.
  • Threat Intelligence Operations & Brand
  • ▪️Global Threat Research: Direct Nation-State and Crimeware tracking; oversee the Unit 42 Research Center and digital strategy to secure dominant market share of voice.
  • ▪️Rapid Response: Orchestrate global crisis operations, mobilizing cross-functional teams to provide customer protections and industry leadership during major cyber outbreaks.
EngineeringProduct ManagementThreat IntelligenceAI AutomationCybersecurity

Mandiant

Vice President, Mandiant Advantage Labs and FLARE Team

May 2021Apr 2022 · 11 mos · New York, New York

  • Led research and development for Mandiant. Provided direction for the Mandiant Advantage Platform including Threat Intelligence, Malware Analysis, and Validation products. Served as technical lead on all external facing Mandiant releases such as open source, blogs, and responsible disclosures. Provided escalation support for Incident Response, Red Team, Engineering, Marketing, and Intelligence teams. Directly interfaced with the legal team regarding intellectual property, ethical code release, and inbound / outbound code matters. Helped guide company and technical teams through the divestiture of the FireEye business.
Research and DevelopmentThreat IntelligenceMalware AnalysisCybersecurity

Trinity cyber

Advisory Board Member

Oct 2020Present · 5 yrs 5 mos · New York, New York

  • Trinity Cyber is a Cybersecurity Startup focused on proactive threat interference. Serve as technical advisor to engineering and intelligence teams, and serve as business advisor to CEO, President, and investors. Participate in onsite strategic planning meetings.
Technical AdvisoryStrategic PlanningCybersecurity

Fireeye, inc.

3 roles

Vice President, FLARE Team

Promoted

Jan 2020May 2021 · 1 yr 4 mos · New York, New York

  • Expanded the FLARE Team to be Front Line Applied Research and Expertise by adding an elite Threat Intelligence and Detection team with a total management responsibility of over 100 personnel. Collaborated with Mandiant Incident Responders during the FireEye breach leading to the direct discovery of the SolarWinds Backdoor code. Briefed numerous government entities on the findings (including CISA and DoD) and helped with corporate messaging.
Threat IntelligenceIncident ResponseTeam ManagementCybersecurity

Senior Director, FLARE Team

Promoted

Jan 2017Dec 2019 · 2 yrs 11 mos · New York, New York

  • Expanded FLARE team to include a full software development team (Dev, UX, QA, PM) and built a cloud-based scalable and flexible platform for binary analysis. Transitioned from monolith application to scalable microservices in the cloud and established 100s of users. Spoke at numerous industry conferences around the world including keynotes and corporate tech talks.
Software DevelopmentCloud ComputingTeam BuildingCybersecurity

Director, FLARE Team

Jan 2014Dec 2016 · 2 yrs 11 mos · New York, New York

  • Founded and built the FLARE (FireEye Labs Advanced Reverse Engineering) brand through creation of the largest reverse engineering CTF in the world, open source release of malware analysis tools, educational resources, blogs, and social media presence.
Reverse EngineeringCTF DevelopmentOpen Source ToolsCybersecurity

Columbia university in the city of new york

Adjunct Assistant Professor, Computer Science

Sep 2014Present · 11 yrs 6 mos · New York, New York

  • Create and teach Malware Analysis and Reverse Engineering to undergraduate and graduate students. Provide office hours, meetings, and career advice to students. Develop custom malware for exams and student projects. Advisor to the CUCyber student organization.
Malware AnalysisTeachingCurriculum DevelopmentCybersecurity

Mandiant

2 roles

Technical Director, M-Labs

Jan 2012Dec 2013 · 1 yr 11 mos · New York, New York

  • Co-founded M-Labs. Built a robust analysis process used by one of the top malware teams in the world. Contributed analysis to the landmark APT1 report exposing one of China's Cyber Espionage Units. Conducted hundreds of recruiting interviews for consulting, engineering, and labs teams. Taught at Black Hat conference for 10 straight years including introductory and advanced courses in classrooms with 100 students in attendance.
Malware AnalysisRecruitingTeachingCybersecurity

Principal Consultant

Jul 2007Dec 2011 · 4 yrs 5 mos · New York, New York

  • Responded to countless high profile intrusions and reverse engineered the malicious software discovered. Found network- and host-based signatures and wrote reports detailing malware capability. Overcame obfuscations and anti-reverse engineering techniques as they were encountered. Developed custom tools and scripts that aid in the reverse engineering of malware, frameworks and command-line tools for various federal consulting customers, and customized Red Team software for consultants.
Incident ResponseReverse EngineeringReport WritingCybersecurity

Mit lincoln laboratory

Technical Staff

Jul 2006Jun 2007 · 11 mos · Lexington, Massachusetts

  • Created a tool for network visualization of security situational awareness through passive analysis. Developed all tool components including parsing, detection, session reconstruction, and plug-in capabilities. Liaised between MIT Lincoln Lab and NSA to provide mission critical tools to the agency.
Network SecurityTeam ManagementCybersecurity

National security agency

Network Vulnerability Engineer

Aug 2002Jul 2006 · 3 yrs 11 mos · Fort Meade, Maryland

  • Graduated from System and Network Interdisciplinary Program (SNIP). Managed team of eight computer scientists in the development of the host-based component of an active network defense system. Personally briefed DIRNSA on results.
Network VisualizationTool DevelopmentCybersecurity

Columbia university in the city of new york

Research and Teaching Assistant, Computer Science

Sep 1999May 2002 · 2 yrs 8 mos · New York, New York

  • Conducted research in the Intrusion Detection Systems (IDS) Lab and helped develop a Windows Registry anomaly detection tool. Graded assignments and held office hours for Digital Logic Circuits, Java Programming, and Data Structures classes.
Network DefenseTeam ManagementCybersecurity

Education

Columbia University

Bachelor of Science - BS — Computer Engineering with minor in Economics

Jan 1998Jan 2002

Johns Hopkins Whiting School of Engineering

Master of Science - MS — Computer Science specializing in Security

Jan 2003Jan 2005

Stackforce found 100+ more professionals with Cybersecurity & Threat Intelligence

Explore similar profiles based on matching skills and experience