Moshe Siman Tov Bustan

CEO

Tel Aviv, Israel17 yrs 1 mo experience
Highly Stable

Key Highlights

  • Led multiple teams in advanced malware analysis.
  • Developed unique security solutions with zero false positives.
  • Published multiple CVEs showcasing expertise.
Stackforce AI infers this person is a Cyber Security expert with a focus on malware analysis and application security.

Contact

Skills

Core Skills

Security ResearchApplication SecurityReverse EngineeringMemory ForensicsLinux SecuritySastSecurity SolutionsMalware AnalysisAndroid SecurityAndroid DevelopmentStatic AnalysisMalware Detection

Other Skills

Supply Chain SecurityCustomer SupportCloud SecurityPythonCC++Objective-CJavax86 AssemblyARMIDAlldbgdb

About

Cyber Security Research Lead @OX Security, skilled with AppSec, Internals, Mobile Security (iOS & Android), Malware, and anything with bits and bytes :) List of published CVEs: CVE-2026-23958: DataEase Account Takeover CVE-2025-65715: IDE Extension Code Execution CVE-2025-65716: IDE Extension Lateral Movement CVE-2025-65717: IDE Extension File Exfiltration CVE-2026-28289: Mail2Shell on FreeScout CVE-2025-11158: Pentaho Server Takeover Conference Talks: OWASP AppSec USA (x2) AppSec Village DEF CON (x1) Oh and I also run Doom on stuff, and play guitar in a progressive metal band.

Experience

17 yrs 1 mo
Total Experience
3 yrs 1 mo
Average Tenure
1 yr 5 mos
Current Experience

Ox security

2 roles

Security Research Team Lead

Nov 2025Present · 6 mos

Security ResearchApplication SecuritySupply Chain Security

Senior Security Researcher

Nov 2024Oct 2025 · 11 mos

Reverse EngineeringMemory Forensics

Kodem

Senior Security Researcher

Feb 2023Oct 2024 · 1 yr 8 mos

  • Security research position, directly reporting to the CTO and VP of Engineering (both Co-Founders).
  • Low level Linux security research and reverse engineering position at the CTO office, gained vast knowledge of programming language internals, was a part of developing a unique Runtime agent solution which achieves function level visibility of any Linux application, led Kodem's offering of reducing false positives at a 90%+ rate.
  • Was responsible of creating SAST rules with 0% false positives for critical code issues, making our customers deal with the issues that matter most.
  • Contributed to three patents for Memory Forensics.
  • Developed, worked on and integrated multiple core technologies such as SAST, eBPF, Docker and Container scanning, and other yet to be released features.
  • Worked directly with customers to give support and receive feedback in order to improve our core features, and consult on various security related solutions.

Alice

3 roles

Security Research Team Lead

Jan 2022Jan 2023 · 1 yr

  • Alice (Formerly ActiveFence)
  • Security research team lead position, directly reporting to the VP Research.
  • Led an Android malware reverse engineering team consisting of 8 malware researchers (6 on site and 2 freelance), a team of 2 Android developers, and one malware analyst.
  • Generated detailed malware analysis reports, bypassing defenses such as anti debug, anti frida, anti tampering, time bomb, packers, and more. Worked on all types of Android malwares such as info stealers, bankers, miners and crypto stealers, ad fraud, phishing, toll fraud, and game cheats.
  • Was responsible of reducing false positives rates for automatic malware analysis, increasing the quality and throughput of the reverse engineering teams to send quality malware reports on a weekly basis.
  • Led and contributed to numerous projects, including developing an Android sandbox designed to bypass packers and automatically identify malicious behavior, as well as creating a proprietary large-scale static analysis engine capable of detecting malicious behavior across large volumes of applications in a short timeframe.

Security Research Tech Lead

Promoted

Jan 2021Jan 2022 · 1 yr

Senior Security Researcher

Jan 2020Jan 2021 · 1 yr

Appdome

2 roles

Security Researcher

Jan 2017Jan 2020 · 3 yrs

  • Security research and innovation position at the CTO office.
  • Contributed to the development of low-level function hooking engines, implemented memory and file encryption, enhanced SSL validation and hardening, and developed anti-tampering and anti-debugging mechanisms. I also worked on the technical integration of FIPS compliance, supported ARM64 and x86-64 architectures, and implemented root and jailbreak detection. These features were integral to the company's no-code mobile app security platform.
  • Was responsible of hacking and generating reports for prospects, in order to show the product's value and increase POC and sales rates.

Automation Developer

Jan 2014Jan 2017 · 3 yrs

Check point software technologies

QA Engineer

Jan 2012Jan 2014 · 2 yrs · Israel

Israeli military intelligence

Network Engineer

Jan 2009Jan 2012 · 3 yrs

Stackforce found 100+ more professionals with Security Research & Application Security

Explore similar profiles based on matching skills and experience