Joel Eriksson

CTO

Limassol, Cyprus33 yrs 3 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Founder of ClevCode specializing in vulnerability research.
  • Former CTO at Cycura, focusing on offensive security.
  • Multiple CTF competition wins showcasing expertise.
Stackforce AI infers this person is a cybersecurity expert with a focus on vulnerability research and exploit development.

Contact

Skills

Core Skills

Vulnerability ResearchExploit Development

Other Skills

Reverse EngineeringMobile SecurityBrowser ExploitationKernel ExploitationMalware AnalysisPenetration TestingSecurityComputer SecurityNetwork SecurityComputer ForensicsApplication SecurityInformation SecurityLinuxProgrammingIDS

About

Founder of ClevCode. We do vulnerability research, exploit development, reverse-engineering, as well as development of tools related to these areas. We very rarely do anything in public, and we focus on building strong relationships with carefully chosen clients rather than advertising ourselves to the public. We target everything from browsers to kernels to basebands. If you are a vulnerability researcher yourself, feel free to get in touch to see if there might be an opportunity for us to work together. Previously the CTO and Head of R&D and joint-owner of Cycura, now acquired by WELL Health Technologies, and before that the CTO and Head of R&D and joint-owner/co-founder of Bitsec, that was acquired by NIXU. As a general rule, I don't get involved with companies unless I have a personal stake in them and believe in their vision. Freedom, with regards to managing my own time and the time of my resources, is very important to me. I need to feel that whatever it is I'm doing is the best way forward to reach the goals that we have set, and when I do, I will give it 100%. I care a lot more about doing interesting things than about recognition and publicity, but when it makes strategic sense (and time allows) - I can do both. ;) From 2015 to 2020, I was the CTO of Cycura. During this time, I was focusing on building our R&D and offensive security division, as well as being a key resource in the teams in question. The last few years, I have been focusing mostly on mobile security research, mostly on the Android side, but nothing public. From 2011 to 2015, I was just focusing on my own company (ClevCode), and participated in various CTFs and other types of challenges. A selection: - 2015: Winner of Boxen - 2015: Winner of SweCTF - 2014: 2nd place in Codegate Quals - 2013: Winner of Black Knight challenge (nSense) - 2013: 3rd place in SECUINSIDE Finals in South Korea - 2012: Cicada 3301 (Google it + my name) - 2011: Winner of PlaidCTF From 2006 to 2011, I was the CTO of Bitsec. We worked on a lot of interesting things, and I was fortunate enough to be able to speak on at least a few of them in public. We did kernel exploitation, including one of the earliest examples of remote wireless kernel exploitation, full-chain Windows exploitation, and I started getting into mobile security research (remote full-chain iOS, etc): - 2008: Speaker at the RSA Conference in San Francisco - 2007: Speaker at BlackHat Europe in Amsterdam - 2007: Speaker at BlackHat USA in Las Vegas - 2007: Speaker at DefCon in Las Vegas Running out of characters, so - EOF

Experience

33 yrs 3 mos
Total Experience
10 yrs
Average Tenure
33 yrs 3 mos
Current Experience

Arma instruments ag

CTO

Jul 2024Present · 1 yr 9 mos · Remote

Cycura inc.

CTO

Sep 2013Aug 2020 · 6 yrs 11 mos · Toronto, Canada

  • We provide advanced penetration testing and R&D-related services within the IT-security sector, for clients with high security demands.

Clevcode ltd

CEO/Founder

Jan 2011Present · 15 yrs 3 mos · Cyprus

  • Originally started as ClevCode AB in Sweden, until I moved to Cyprus and started ClevCode Ltd. We do vulnerability research, exploit development and reverse-engineering, focusing mostly on mobile, browser and kernel exploitation.
  • We have never advertised, and pretty much everything we do is confidential. Our clients tends to find us, and they tend to stay. We are primarily working with long-term research contracts, and we are very selective with regards to the clients we would be open to work with.
Vulnerability ResearchExploit DevelopmentReverse EngineeringMobile SecurityBrowser ExploitationKernel Exploitation

Bitsec ab

CTO

Jun 2006Feb 2011 · 4 yrs 8 mos · Greater Stockholm Metropolitan Area

  • http://www.bitsec.com/en/

Bitnux ab

CEO

Jan 2003Jun 2006 · 3 yrs 5 mos · Gävle, Sweden

  • Systems development. Security assessments. Vulnerability research. Developing and holding trainings in the area of vulnerability analysis, reverse-engineering and exploit development. Malware analysis.

Utilator ab

Developer

Jun 2001Dec 2002 · 1 yr 6 mos · Gävle, Sweden

  • System and security administration. Embedded systems development.

Freelancer

IT Security Specialist, Systems Administrator & Developer

Jun 1996Jun 2001 · 5 yrs

  • System and security administration. Penetration testing and security assessments. Writing for security related magazines. Systems development for Unix (Linux, Solaris, *BSD), Windows and telecom related systems.

Internet

IT Security Researcher

Jan 1993Present · 33 yrs 3 mos

Education

University of Gävle

Jan 1998Jan 2001

Stackforce found 100+ more professionals with Vulnerability Research & Exploit Development

Explore similar profiles based on matching skills and experience