Ilias Dimopoulos

Product Engineer

Greece17 yrs 3 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Expert in vulnerability assessments and penetration testing.
  • Recognized for contributions with multiple CVEs.
  • Strong collaboration with organizations for tailored security solutions.
Stackforce AI infers this person is a Cybersecurity Specialist with expertise in vulnerability assessments and penetration testing.

Contact

Skills

Core Skills

Penetration TestingVulnerability AssessmentRed TeamingVulnerability Reporting

Other Skills

Bug Bounty HuntingCybersecurity ResearchExploit DevelopmentProject ManagementComputer SecurityWeb Application SecurityNetworkingC/C++Genetic AlgorithmsLinuxTeam LeadershipTroubleshootingResearchPublic SpeakingSecurity

About

As a cybersecurity professional, my purpose is to protect businesses and individuals from the ever-increasing cyber threats that we face in today's digital age. I believe that everyone deserves the peace of mind that comes with knowing their digital assets are secure and their data protected, and I'm passionate about using my expertise to make that a reality. With extensive experience in offensive security, I specialize in conducting Web Application, Mobile Application, Internal/External infrastructure, and Wireless infrastructure vulnerability assessments and penetration testing exercises, as well as social engineering, Red teaming, and Red vs Blue exercises. By working closely with organizations, I develop tailored solutions that meet their unique needs and help them achieve their security goals. But my work isn't just about technical expertise - it's about empowering businesses and individuals to achieve their objectives with confidence. I'm committed to building strong relationships with the organizations I collaborate with, so that I can truly understand their needs and work collaboratively to create effective solutions. My focus is always on providing value to those I work with. While I have primarily assisted organizations and individuals in enhancing their cybersecurity in Europe and Middle East, I have also worked with organizations and individuals from other regions as well. But don't just take my word for it. You can find recommendations from my former managers, supervisors, colleagues, and clients in the "Recommendations" section of my profile. Additionally, you can see a list of published CVE numbers and public recognition from companies that have acknowledged my contributions in the "Publications" section. As someone who is passionate about cybersecurity and protecting digital assets, I'm always happy to connect with others who share this passion. If you're interested in discussing your security concerns or sharing ideas about how to improve your organization's security posture, please feel free to reach out. Let's work together to make the digital world a safer place.

Experience

Neurosoft

2 roles

Senior Pentester/Security Researcher

Feb 2020 – Jan 2022 Β· 1 yr 11 mos

  • During my time at Neurosoft S.A (2018-2022), I had the opportunity to work as both a Senior Penetration Tester and a Security Researcher. My roles and and some of my responsibilities were as follows:
  • As a Senior Penetration Tester:
  • πŸ” Conducting penetration testing and red teaming exercises as part of the red teaming team.
  • πŸ‘¨β€πŸ’Ό Organizing and executing exercises, developing exploits when necessary, and writing the final report.
  • As a Security Researcher:
  • πŸ† Discovering and reporting vulnerabilities that earned our team the BugCrowd MVP status for Q2 of 2020.
  • πŸš€ Developing public and private exploits for vulnerabilities affecting products of major vendors, such as Escalation of Privileges affecting OneDrive, Symantec Endpoint Protection, BitDefender, and more, which can be found in the company's GitHub or blog. To learn more about the acknowledgements for these exploits, please refer to the links provided at the end of this section, where you can find indicative references to them.
  • πŸ’‘ Contributing to the department by suggesting new product ideas and providing micro-patching solutions for most of the 0-day exploits I discovered.
  • Attending the Blackhat Conference in 2018 was one of the highlights of my time at Neurosoft S.A. By participating in the conference as an attendee and watching the speeches, I was able to learn a lot about the latest cybersecurity trends and technologies, and was able to network with other professionals in the field.
  • Overall, my time at Neurosoft S.A allowed me to develop my skills and contribute to the company's goal of staying ahead of the cybersecurity curve. I am proud of the work I did during my time there, and I will continue to apply the knowledge and skills I gained to my future endeavors.
Penetration TestingRed TeamingExploit DevelopmentVulnerability Reporting

Senior Penetration Tester

Jul 2018 – Feb 2020 Β· 1 yr 7 mos

Adacom cyber security

GRC and Assurance Specialist

Feb 2016 – Jul 2018 Β· 2 yrs 5 mos

  • As a penetration tester at ADACOM S.A, I conducted various assessments and penetration testing exercises for Infrastructure, Web and Mobile Applications, Wireless and social engineering exercises.
  • πŸ‘¨β€πŸ’Ό I collaborated with medium-sized businesses, large companies, and organizations in Europe and the Middle East.
  • πŸ“Š I was responsible for project sizing, execution, and report writing.
  • Through my work at ADACOM, I gained valuable experience in managing and executing complex penetration testing projects and developed strong communication skill
Penetration TestingVulnerability AssessmentProject Management

Greek army

Military Service

Jan 2014 – Jan 2014 Β· 0 mo

  • I finished compulsory military service on September 20, 2014.

Self-employed

Offensive Security Professional | Security Researcher | Bug Bounty Hunter

Jan 2013 – Present Β· 13 yrs 2 mos

  • If you're visiting my LinkedIn profile, you may be interested in checking out my "About" section to learn some general information about my background and experience, as the content of the current section primarily focuses on my experience as a Security Researcher and Bug Bounty Hunter.
  • Throughout my career, I've identified and reported several vulnerabilities, some of which have been recognized as CVEs, including:
  • πŸ›‘οΈ CVE-2020-1082: Microsoft Windows Elevation of Privilege
  • πŸ›‘οΈ CVE-2020-5837: Symantec Endpoint Protection Manager (SEPM) Elevation of Privilege
  • πŸ›‘οΈ CVE-2019-1322: Microsoft Windows Elevation of Privilege
  • πŸ›‘οΈ CVE-2019-18372: SEPM Elevation of Privilege
  • πŸ›‘οΈ CVE-2018-18367: SEPM Elevation of Privilege
  • πŸ›‘οΈ CVE-2018-18368: SEPM Elevation of Privilege
  • The "Publications" section of my profile is where you can find references for additional CVEs that I have discovered, including more recent ones, both as an individual and while working for employers.
  • As an active member of the security community, I maintain several profiles where you can find more information about my work:
  • 🌟 My GitHub Repository: Recent projects, exploits and contributions to open-source projects.
  • πŸ’» My HackerOne Profile: Bug bounty activities and contributions.
  • πŸ“‚ My PacketStorm Profile: Older exploits and reports.
  • You can access these profiles by clicking on the corresponding "media" link, provided at the end of this section.
  • Additionally, the last "media" photo is from a 2015 event with IEEE NTUA Student Branch. I was a guest speaker discussing security trends.
  • 🀝 As someone who is passionate about cybersecurity and protecting digital assets, I'm always happy to connect with others who share this passion. Please feel free to reach out if you're interested in discussing your security concerns or sharing ideas on how to improve your organization's security posture. Let's work together to make the digital world a safer place.
Vulnerability AssessmentPenetration TestingBug Bounty HuntingCybersecurity Research

Larco gmmsa

internship

Jul 2011 – Aug 2011 Β· 1 mo Β· Larymna, Greece

Hellenic statistical authority

Section Manager in Census of Population and Buildings

Feb 2011 – May 2011 Β· 3 mos Β· Athens, Greece

  • Preparation and Management of the enumerator team
  • Preparation of final section report for Headquarters

Andreou chocolatier

2 roles

Sales Consultant

Jan 2010 – Jan 2014 Β· 4 yrs

  • Deal with customer issues
  • Keep up to date with product developments
  • Devise new marketing strategies
  • Schedule appointments, calls, and meetings
  • researching markets and competitor organizations
  • Managing, training and leading a sales team
  • Proposals for new products

Sales Associate

Jan 2009 – Jan 2010 Β· 1 yr

  • Management and preparation of wholesale orders
  • Customer Service
  • Delivering products
  • Debt collection

Education

National Technical University of Athens

Master's degree

Jan 2004 – Jan 2012

Stackforce found 100+ more professionals with Penetration Testing & Vulnerability Assessment

Explore similar profiles based on matching skills and experience