Eduardo Garcia Melia

Co-Founder

Andorra, Andorra16 yrs 9 mos experience
AI Enabled

Key Highlights

  • Expert in pentesting AI systems and LLMs.
  • Creator of multiple AI security tools.
  • Mentor in AI automation and secure design.
Stackforce AI infers this person is a Cybersecurity Specialist with a focus on AI and machine learning security.

Contact

Skills

Core Skills

PentestingOffensive SecurityProduct DevelopmentSecurity ToolingMentorshipAi SecurityPenetration TestingCybersecurityWeb Application SecuritySecurity AnalysisMalware AnalysisThreat Identification

Other Skills

Pentesting AI systemsAI-powered systemsBurp Bounty ProBurp Bounty GoGBountyBounty PromptMentoring in AIAI automationSecure system designAPI securityWeb application security auditsReverse engineeringEthical HackerComputer SecurityExploiting

About

Co-Founder & AI Security Lead at Kaptor Security | Founder at Bounty Security | Mentor at Divisual Project AI Cybersecurity Specialist focused on pentesting AI systems. More clients are deploying LLMs, AI agents, and ML pipelines in production, and they need someone who can actually break them. At Kaptor Security, we specialize in offensive security for AI-powered systems, from prompt injection and data exfiltration to logic abuse in multi-agent architectures. Creator of Burp Bounty Pro, Burp Bounty Go, GBounty, and the AI-powered Bounty Prompt Burp Suite extension. Having built AI features myself helps when attacking them, you understand the architecture, the assumptions developers make, and where the weak points are. At Divisual, I mentor professionals in artificial intelligence, helping them build practical skills in AI automation, and secure system design. 🔍 Core focus areas: ➜ Pentesting LLMs, AI agents, and ML pipelines in production environments ➜ Attacking multi-agent architectures: prompt injection, data exfiltration, tool abuse, logic flaws ➜ Building offensive security tooling for AI systems (Burp Bounty Pro AI Scanner, Kaptor) ➜ Red teaming AI-powered automation workflows and orchestration platforms ➜ Applying MITRE ATLAS, OWASP LLM Top 10, and NIST AI RMF in real engagements 🎓 CAISP (Certified AI Security Professional), Certified AI/ML Pentester, CEH, CEI ✨ Speaker at Ekoparty, UAD360, DragonJAR, Cobalt.io, and Navaja Negra.

Experience

16 yrs 9 mos
Total Experience
2 yrs 2 mos
Average Tenure
7 mos
Current Experience

Kaptor security

Co-Founder & AI Security Lead

Dec 2025Present · 5 mos

  • My focus is pentesting AI systems. More and more clients are deploying LLMs, AI agents, and ML pipelines in production, and they need someone who can actually break them.
Pentesting AI systemsOffensive securityAI-powered systemsPentestingOffensive Security

Divisual project

Mentor in Cybersecurity & Artificial Intelligence

Oct 2025Present · 7 mos · Andorra · Remote

  • I mentor professionals in artificial intelligence, helping them build practical skills in AI automation, and secure system design.
Mentoring in AIAI automationSecure system designMentorshipAI Security

Strike

3 roles

AI Hacking Manager

Jun 2025Oct 2025 · 4 mos · Remote

Principal AI Security Engineer

Mar 2025Jun 2025 · 3 mos · Remote

Pentester - Cyber Security Specialist

Nov 2022Jun 2025 · 2 yrs 7 mos · Remote

  • As a Freelance Penetration Tester, I specialize in managing and executing comprehensive security assessments for web applications, APIs, mobile applications (Android), and both internal and external network infrastructures. My collaboration with renowned security firms like Strike (https://strike.sh) allows me to deliver top-tier security solutions tailored to meet the unique needs of each client.

Tarlogic

Cybersecurity Advisor

Jun 2024Dec 2024 · 6 mos · Remote

Bounty security

Founder

Aug 2022Present · 3 yrs 9 mos · Remote

  • At Bounty Security (https://bountysecurity.ai), I contribute to the continuous improvement, testing, and effectiveness evaluation of our core security products: Burp Bounty Pro, Burp Bounty Go, GBounty, and Bounty Prompt. My role focuses on identifying enhancements, assessing performance, and ensuring these tools deliver optimal results in real-world cybersecurity scenarios.
Burp Bounty ProBurp Bounty GoGBountyBounty PromptProduct DevelopmentSecurity Tooling

Cobalt

Lead Pentester - Cyber Security Specialist

Jun 2020Present · 5 yrs 11 mos · Remote

  • As a Freelance Penetration Tester, I specialize in managing and executing comprehensive security assessments for web applications, APIs, LLMs models, AI automations, mobile applications (Android), and both internal and external network infrastructures. My collaboration with renowned security firms like Cobalt (https://www.cobalt.io) allows me to deliver top-tier security solutions tailored to meet the unique needs of each client.
Web application securityAPI securityPenetration testingPenetration TestingCybersecurity

Telefónica tech

Senior Security Analyst

Jun 2017Jul 2020 · 3 yrs 1 mo · Madrid Area, Spain

  • Conducted web application security audits to identify vulnerabilities and develop remediation strategies.
  • Evaluated API REST and JWT protocols for secure data transmission and access prevention.
  • Assessed Android Apps for security weaknesses and potential attack vectors through reverse engineering and code analysis.
  • As a Senior Security Analyst at Telefónica, I collaborated with cross-functional teams to implement effective security measures and policies, including thorough source code reviews to identify coding errors and security vulnerabilities. My attention to detail and technical expertise allowed me to provide recommendations to development teams for improving code quality and security.

Tarlogic

Senior Security Consultant

Feb 2016Jun 2017 · 1 yr 4 mos · Santiago de Compostela y alrededores, España

  • During my time as a Senior Security Consultant, I gained significant experience in a variety of areas. My work conducting web application security audits and penetration testing, both external and internal networks, allowed me to develop a deep understanding of the vulnerabilities that exist in these systems and how best to address them.
  • In addition, I was responsible for conducting malware analysis and reverse engineering, which required a strong ability to identify and analyze complex threats.
  • My expertise in analyzing and testing Android Apps allowed me to identify vulnerabilities and suggest improvements to ensure secure data transmission.
  • Overall, my experience in this role allowed me to develop a strong foundation in security analysis and testing methodologies, as well as a deep understanding of the security risks faced by modern organizations.
Web application security auditsAPI securityReverse engineeringWeb Application SecuritySecurity Analysis

Internet security auditors

2 roles

Project Manager and Senior IT Security Analyst

Dec 2014Feb 2016 · 1 yr 2 mos · Barcelona y alrededores, España

  • I was responsible for a diverse range of responsibilities, these included:
  • Project management: I managed multiple IT security projects, from planning and budgeting to implementation and delivery. I ensured that projects were delivered on time, within budget, and to the required quality standards.
  • Web application security audits and Penetration Testing: I conducted comprehensive security audits of web applications and performed penetration testing (external and internal) to identify potential vulnerabilities and remediation strategies.
  • PCI DSS: I ensured that all relevant systems and applications were compliant with the Payment Card Industry Data Security Standard (PCI DSS).
  • WIFI network audits: I conducted security audits of WIFI networks to identify vulnerabilities and recommend security improvements.
  • Instructor in Security Courses: I taught security courses, including Secure Programming in Web environments and Web Security, to help train and develop the next generation of security professionals.
  • Writing secure programming guides: I wrote comprehensive guides on secure programming practices to help developers write secure code.
  • Source code reviews: I conducted in-depth reviews of source code to identify potential security vulnerabilities and coding errors.

Senior IT Security Analyst

Jan 2008Nov 2013 · 5 yrs 10 mos · Barcelona y alrededores, España

  • I was responsible for a diverse range of responsibilities, these included:
  • Web application security audits and Penetration Testing: I conducted comprehensive security audits of web applications and performed penetration testing (external and internal) to identify potential vulnerabilities and remediation strategies.
  • PCI DSS: I ensured that all relevant systems and applications were compliant with the Payment Card Industry Data Security Standard (PCI DSS).
  • WIFI network audits: I conducted security audits of WIFI networks to identify vulnerabilities and recommend security improvements.
  • Instructor in Security Courses: I taught security courses, including Secure Programming in Web environments and Web Security, to help train and develop the next generation of security professionals.
  • Writing secure programming guides: I wrote comprehensive guides on secure programming practices to help developers write secure code.
  • Source code reviews: I conducted in-depth reviews of source code to identify potential security vulnerabilities and coding errors.
Malware analysisReverse engineeringMalware AnalysisThreat Identification

Panda security

Anti-Malware Researcher

Nov 2013Dec 2014 · 1 yr 1 mo · Bilbao y alrededores, España

  • As an Anti-Malware Researcher, I was responsible for conducting reverse engineering of malware and analyzing it to identify its behavior and potential impact. I also worked on developing exploits to take advantage of vulnerabilities in the malware and understand how it can be used by malicious actors.
  • Through this experience, I developed strong technical skills in malware analysis and reverse engineering, as well as the ability to identify potential threats and take proactive measures to mitigate them.

Tissat

Junior IT Security Analyst

Jul 2007Jan 2008 · 6 mos · Valencia, España

  • As a Junior IT Security Analyst, I gained experience in various aspects of IT security, including reviewing defense systems and performing penetration testing and web application security audits.
  • I also developed my programming skills by writing scripts to assist in system attacks and worked on computer management tasks.
  • Overall, my experience in this role helped me to develop a strong foundation in IT security and prepared me for more senior positions in the field.

Education

Royal Holloway, University of London

Malicious Software and its Underground Economy: Two Sides to Every Story

Jan 2013Jan 2013

Stackforce found 100+ more professionals with Pentesting & Offensive Security

Explore similar profiles based on matching skills and experience