Evgen VerzunšŸ›”ļø

Founder

Abu Dhabi, Abu Dhabi Emirate, United Arab Emirates23 yrs 9 mos experience
Highly StableAI Enabled

Key Highlights

  • 20 years of experience in technology and cybersecurity.
  • Founder of innovative cybersecurity solutions.
  • Expert in developing secure communication platforms.
Stackforce AI infers this person is a Cybersecurity and Telecommunications expert with extensive experience in secure communication solutions.

Contact

Skills

Core Skills

CybersecurityArtificial Intelligence (ai)Software DevelopmentProject ManagementTelecommunicationsEmail SecurityMessaging

Other Skills

AutomationCommunicationSoftware Project ManagementManagementVoIPStart-upsInventionCloud ComputingBusiness StrategyStartupSolution ArchitectureInternet of Things (IoT)TokensInvestmentsEntrepreneurship

About

I spent the last 20 years constantly collaborating with tech-savvy professionals. Whether I was a system and software architect or took the managerial route of a CEO in a promising startup, I’ve always enjoyed my time and experiences. Looking back at my career, accolades, and all the friends I’ve made on this journey, I wouldn’t have it any other way. During my early years in technology innovations, I’ve been involved in the development of security systems and professional communications for mission-critical projects in the United States, Europe, and the Middle East. Later I carried that experience over to the commercial sector, creating and inventing professional software/hardware solutions for telecommunication, security, and e-commerce markets. I have an amazing team, which has been developing cybersecurity solutions with me for more than 15 years. We worked on projects dedicated to protecting several communication channels over different networks, then created a decentralized platform that empowers companies of different sizes: from micro to large ones in different areas of the economy. Our solutions are based on patented technology, which you can see listed below in my profile. Apart from сontibuting in these works, I’ve also written a few books dedicated to email security. From time to time I share my insights in a personal blog, where I offer my thoughts on the subjects of cybersecurity, crypto, and general high-end technology. My areas of expertise are Inventing, Cybersecurity, Entrepreneurship, IT, software development, professional communication, Blockchain, Cryptocurrencies, and Startups. Today, my dominant passion is a continuous exploration of new opportunities in technology-based markets. Therefore, I’m currently leading Kaizen.Finance, is the first cross-chain token lifecycle management platform where projects and DAOs can securely generate, issue, and manage their token offerings without writing a single line of code. If you have interesting information, ideas, business propositions, or just a question - don’t hesitate to contact me and share a bit of info about yourself. I’m always open to new experiences!

Experience

23 yrs 9 mos
Total Experience
5 yrs 8 mos
Average Tenure
3 yrs 3 mos
Current Experience

R2copilot

Founder, CEO Verizon Solutions

Feb 2023 – Present Ā· 3 yrs 3 mos Ā· Abu Dhabi, Abu Dhabi Emirate, United Arab Emirates Ā· On-site

  • R2 Copilot is a privacy-focused AI assistant designed for secure communication and protected collaboration across Microsoft 365. We help organizations use AI without compromising confidentiality, ensuring that sensitive data never leaves their environment unprotected.
  • Publisher: Verizon Solutions FZ LLE
AutomationArtificial Intelligence (AI)CybersecurityCommunication

Stealthmail

CTO, Cybersecure Email for Business, Microsoft Office365, Google GSuit

Jun 2020 – Feb 2023 Ā· 2 yrs 8 mos

  • StealthMail is a pioneering cybersecurity solution that protects business email communications through robust, end-to-end encryption, giving companies exclusive control over their email data. Recognized as a top-priority Microsoft partner, StealthMail secures emails by making them invisible to third parties, including cybercriminals, while ensuring compliance with regulatory standards.
  • The platform integrates seamlessly with Microsoft Office 365, Google G Suite, and Microsoft Teams, enhancing security by encrypting each email and attachment individually on the user’s side and storing the content in protected cloud environments or designated storage locations. With StealthMail, encryption keys are generated and stored solely on the user's end, empowering users to decide where their data resides—whether on local servers, in the cloud, or within StealthMail’s secured infrastructure.
  • Key Features:
  • End-to-End Encryption: True end-to-end encryption with user-controlled encryption keys ensures data privacy and security from inception to storage.
  • Secure Dynamic Network Protocol (SDNP): StealthMail employs SDNP, a cutting-edge protocol that creates a "stealth" communication layer, making sensitive data exchanges invisible and inaccessible to unauthorized entities.
  • Office 365 and G Suite Encryption: Adds a high-security layer to email communication within Microsoft and Google platforms, protecting against unauthorized access and ensuring compliance.
  • Microsoft Teams Encryption: Provides instant, secure sharing of content-sensitive messages, files, and multimedia within Teams for secure collaboration.
  • Enterprise-Grade Security: Tailored solutions for large organizations to safeguard against cyber threats, prevent data breaches, and meet stringent compliance requirements.
  • StealthMail represents a category-leading solution in stealth data protection, offering enterprises unmatched control, security, and compliance for their critical communications.
Start-upsEmail SecuritySoftware Project ManagementCybersecurityInventionCloud Computing

Stealthtalk

CTO at Cybersecure Private Messenger

Apr 2018 – Jun 2020 Ā· 2 yrs 2 mos

  • StealthTalk (by StealthMail) is a secure messaging platform built for professionals and privacy-focused users, designed to meet the stringent security demands of business and sensitive communications. Utilizing the patented Secure Dynamic Network Protocol (SDNP), originally developed for mission-critical communications in military and emergency services, StealthTalk merges professional-grade security with user-friendly functionality.
  • StealthTalk is tailored for users who require absolute privacy, offering robust protection with features like true end-to-end encryption and zero-knowledge proof. This platform ensures that sensitive communications remain fully private, with data encryption and decryption performed entirely on the user’s device, independent of central servers.
  • Key Features:
  • Secure Voice Calls: High-quality voice calls secured via TETRA over IP, maintaining reliability even on low-bandwidth connections.
  • End-to-End Encrypted Messaging: True end-to-end encryption, with encryption keys managed on the user’s device, preventing unauthorized access to message content.
  • Self-Destruct Messages: Time-sensitive messages that automatically delete, supporting confidential communication.
  • Stealth Mode: Password-protected environment for high-security calls and messages, requiring user authentication to access sensitive content.
  • Privacy & Security:
  • True End-to-End Encryption: All communications are protected with SDNP-based encryption using ECC 512, AES 256, and SHA-3 512 for unparalleled security.
  • Zero-Knowledge Proof: StealthTalk’s zero-knowledge architecture ensures no user data is collected, stored, or accessible on StealthTalk’s servers.
  • StealthTalk is built to bridge the gap between consumer and enterprise security solutions, leveraging professional telecommunications technology to provide a trusted, secure platform for today’s privacy-conscious users.
Start-upsCommunicationMessagingSoftware Project ManagementCybersecurityInvention+1

Listat software development

Director, Chief Software Architect Professional Telecommunication solutions

Jan 2006 – Feb 2025 Ā· 19 yrs 1 mo

  • Listat is recognized for its expertise in developing custom software for the professional telecommunication sector, with an emphasis on flexibility, scalability, and ease of use, all while keeping operational costs low.
  • The team at Listat consists of top-tier developers, specializing in mission-critical, time-critical, embedded, and command & control systems, with a broad range of applications across security, transportation, and enterprise communication. The primary goal is to leverage innovative technologies in software development to deliver professional-grade solutions that meet the unique needs of clients worldwide.
  • Project Highlights:
  • Extensive development experience with TETRA infrastructures such as DAMM, TetraFlex, Rohde&Schwarz ACCESSNET-T, and EADS, supporting public safety and emergency services with robust communication solutions.
  • Expertise in professional mobile radios (PMR) systems from industry leaders like Sepura, Motorola, and EADS, ensuring reliable and secure communications for specialized industries.
  • Integration and support of network equipment from Digium, Sangoma, and Cisco, with applications in large-scale systems.
  • Development on platforms such as Asterisk and Cisco, bringing adaptability and integration capabilities to mission-critical communication networks.
  • Vision
  • Listat is committed to transforming perceptions of professional solutions, traditionally viewed as complex, rigid, and costly. The vision centers on an IT world powered by adaptable, scalable, and intuitive solutions, enabling organizations to deploy high-quality tools with ease.
  • Specialization
  • With deep expertise in telecommunication and a track record of successful global implementations, Listat specializes in mission-critical, time-sensitive, and secure systems, particularly for industries requiring robust command & control solutions. This experience ensures that every solution aligns with Listat’s vision of creating high-quality, reliable, and scalable products.
Software DevelopmentSoftware Project ManagementManagementProject ManagementVoIP

Jti

Business Application Analyst

Jun 2005 – Nov 2005 Ā· 5 mos

  • Manage IT business applications projects and developments. Develop and implement new and maintain existing business applications and/or interfaces to them in order to ensure that business functions of the organization can meet their established business objectives in a timely and accurate manner. Search for the best practices and solutions implemented in order to cover region customers needs.
Software DevelopmentBusiness StrategyProject Management

Lcg

Software Developer

Dec 2003 – Sep 2005 Ā· 1 yr 9 mos

  • As Lead Software Developer, I led the development of telecommunications solutions, focusing on optimizing systems for reliability, performance, and user experience. I worked extensively with C++ across various platforms, leveraging gcc, MSVC++ (Windows API, WinSocks), and Borland C++ Builder (VCL, BDE). My responsibilities included database integration with MySQL and MSSQL, developing responsive web interfaces with HTML and JavaScript (AJAX), and backend scripting in PHP. I collaborated closely with cross-functional teams to deliver robust, scalable software solutions across FreeBSD, Linux, and Windows environments.
  • Technologies Used:
  • Programming Languages: C/C++ (gcc, MSVC++, Borland C++ Builder)
  • Operating Systems: FreeBSD, Linux, Windows
  • Databases: MySQL, MSSQL
  • Web Technologies: HTML (HTML4, DHTML), JavaScript (AJAX), PHP (PHP 3/4/5)
Software Development

Alitel ltd

Software Developer

Jun 2002 – Dec 2003 Ā· 1 yr 6 mos

  • As a Software Developer at ALITEL LTD, I contributed to the development of a VoIP billing system, focusing on efficient data management and billing accuracy within telecommunications networks. My work involved building backend solutions in C++ (gcc), integrating MySQL for database management, and utilizing Radius RLM for user authentication and authorization. I also developed CGI scripts to streamline web-based interfaces for the system, enhancing usability and operational efficiency.
  • Technologies Used:
  • C++ (gcc)
  • MySQL
  • Radius RLM
  • CGI
Software Development

Education

National Technical University of Ukraine 'Kyiv Polytechnic Institute'​

Master’s Degree — Computer Science

Jan 2000 – Jan 2006

International university of Finance (MUF)

Bachelor of Business Administration - BBA

Sep 2004 – Jun 2006

National Technical University of Ukraine 'Kyiv Polytechnic Institute'​

Bachelor's degree — Computer Sciences

Sep 2000 – Jun 2004

East Ukrainian National University - SHMT

Engineer's degree

Sep 1996 – Jun 2000

Stackforce found 100+ more professionals with Cybersecurity & Artificial Intelligence (ai)

Explore similar profiles based on matching skills and experience