Joel Eriksson — CTO
Founder of ClevCode. We do vulnerability research, exploit development, reverse-engineering, as well as development of tools related to these areas. We very rarely do anything in public, and we focus on building strong relationships with carefully chosen clients rather than advertising ourselves to the public. We target everything from browsers to kernels to basebands. If you are a vulnerability researcher yourself, feel free to get in touch to see if there might be an opportunity for us to work together. Previously the CTO and Head of R&D and joint-owner of Cycura, now acquired by WELL Health Technologies, and before that the CTO and Head of R&D and joint-owner/co-founder of Bitsec, that was acquired by NIXU. As a general rule, I don't get involved with companies unless I have a personal stake in them and believe in their vision. Freedom, with regards to managing my own time and the time of my resources, is very important to me. I need to feel that whatever it is I'm doing is the best way forward to reach the goals that we have set, and when I do, I will give it 100%. I care a lot more about doing interesting things than about recognition and publicity, but when it makes strategic sense (and time allows) - I can do both. ;) From 2015 to 2020, I was the CTO of Cycura. During this time, I was focusing on building our R&D and offensive security division, as well as being a key resource in the teams in question. The last few years, I have been focusing mostly on mobile security research, mostly on the Android side, but nothing public. From 2011 to 2015, I was just focusing on my own company (ClevCode), and participated in various CTFs and other types of challenges. A selection: - 2015: Winner of Boxen - 2015: Winner of SweCTF - 2014: 2nd place in Codegate Quals - 2013: Winner of Black Knight challenge (nSense) - 2013: 3rd place in SECUINSIDE Finals in South Korea - 2012: Cicada 3301 (Google it + my name) - 2011: Winner of PlaidCTF From 2006 to 2011, I was the CTO of Bitsec. We worked on a lot of interesting things, and I was fortunate enough to be able to speak on at least a few of them in public. We did kernel exploitation, including one of the earliest examples of remote wireless kernel exploitation, full-chain Windows exploitation, and I started getting into mobile security research (remote full-chain iOS, etc): - 2008: Speaker at the RSA Conference in San Francisco - 2007: Speaker at BlackHat Europe in Amsterdam - 2007: Speaker at BlackHat USA in Las Vegas - 2007: Speaker at DefCon in Las Vegas Running out of characters, so - EOF
Stackforce AI infers this person is a cybersecurity expert with a focus on vulnerability research and exploit development.
Location: Limassol, Cyprus
Experience: 33 yrs 3 mos
Skills
- Vulnerability Research
- Exploit Development
Career Highlights
- Founder of ClevCode specializing in vulnerability research.
- Former CTO at Cycura, focusing on offensive security.
- Multiple CTF competition wins showcasing expertise.
Work Experience
ARMA Instruments AG
CTO (1 yr 9 mos)
Cycura Inc.
CTO (6 yrs 11 mos)
ClevCode Ltd
CEO/Founder (15 yrs 3 mos)
Bitsec AB
CTO (4 yrs 8 mos)
Bitnux AB
CEO (3 yrs 5 mos)
Utilator AB
Developer (1 yr 6 mos)
Freelancer
IT Security Specialist, Systems Administrator & Developer (5 yrs)
Internet
IT Security Researcher (33 yrs 3 mos)
Education
at University of Gävle