Alessandro M.

Consultant

Velletri, Latium, Italy15 yrs 7 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over 10 years of experience in cybersecurity.
  • Expert in offensive security and red teaming.
  • Active contributor to open-source security projects.
Stackforce AI infers this person is a Cybersecurity expert with strong capabilities in offensive security and automation.

Contact

Skills

Core Skills

Red TeamingAdversary SimulationWeb Application Penetration TestingAutomationPenetration TestingIt Security EngineeringSecurity ConsultingFreelance Consulting

Other Skills

Malware DevelopmentWindows / Linux / MacOS InternalsC (Programming Language)C#PresentationsContinous AssesstmentAdvanced Web ExploitationInfrastructure Penetration TestingTechnical WritingMobile Application Penetration TestingEvasionEnablementActive DirectoryMalware AnalysisForensic Analysis

About

I am a security researcher with 10+ years of experience in the IT field, including over 7 years dedicated to cybersecurity consultancy. I focus on exploring emerging cybersecurity challenges and developing innovative solutions. Throughout my career, I’ve gained extensive experience working across diverse industries, tackling a wide variety of technologies and assessment scenarios. This exposure has honed my ability to adapt, innovate, and deliver effective security strategies tailored to unique organizational needs. In addition to my professional work, I am an active member of the open-source community, previously supported by the "Porchetta Industries" initiative. As an open-source developer, I have authored and maintained several projects and tools ranging from offensive security to automation, including: - Inceptor: Template-Driven AV/EDR Evasion Framework - Chameleon: PowerShell Obfuscator - Vortex: VPN Portals Attacking Toolset - SysWhispers3: EDR bypass framework via direct syscalls - DriverJack: Loading vulnerable drivers leveraging emulated RO filesystems and NTFS - StackMoonwalking: Leveraging SETFPREG frames with ROP to spoof the callstack at runtime Driven by a deep passion for cybersecurity and secure programming, I actively engage in bug hunting and researching advanced security countermeasures. I am inspired by the mantra: "See what everybody else has already seen, but think what nobody else has thought".

Experience

15 yrs 7 mos
Total Experience
3 yrs 9 mos
Average Tenure
7 yrs 4 mos
Current Experience

Specterops

Senior Security Consultant

Apr 2025Present · 1 yr 1 mo · Rome, Latium, Italy · Remote

  • I conduct offensive security engagements, including red teaming, adversary emulation, and penetration testing, to assess and improve security postures. My work involves:
  • Planning and executing offensive engagements across various environments.
  • Developing tools, scripts, and methodologies to enhance offensive security capabilities.
  • Serving as a subject matter expert in areas such as initial access, evasion, and adversary tradecraft.
  • Training and mentoring teams in offensive security techniques and best practices.
  • I focus on helping organizations identify and mitigate real-world threats through structured, intelligence-driven security assessments.
Adversary SimulationRed TeamingMalware DevelopmentWindows / Linux / MacOS InternalsC (Programming Language)C#

Cobalt

Penetration Tester

Sep 2022Present · 3 yrs 8 mos · Italy · Remote

  • As a pentester at Cobalt, I specialize in identifying, exploiting, and reporting vulnerabilities to strengthen the security posture of our clients. My duties involve conducting in-depth security assessments, including web application testing, network penetration testing, and social engineering engagements.

Synack red team

Bug Bounty Hunter

Dec 2021Present · 4 yrs 5 mos · Rome, Latium, Italy

  • As a member of SynackRT, I am taking part in a number of Bug Hunting programs that help businesses find and fix high-risk security holes.
Continous AssesstmentWeb Application Penetration TestingAdvanced Web ExploitationAutomationInfrastructure Penetration TestingTechnical Writing+1

Freelance

Open Source Developer

Jan 2019Present · 7 yrs 4 mos · Rome, Latium, Italy · Remote

  • Author of Open Source projects and tools, ranging from offensive security to automation. Official maintainer of the following projects:
  • Inceptor: Template-Driven AV/EDR Evasion Framework
  • Chameleon: PowerShell obfuscator
  • Vortex: VPN Portals Attacking Toolset
  • SysWhispers3: EDR bypass framework via direct syscalls
  • DriverJack: Loading vulnerable drivers leveraging emulated RO filesystems and NTFS
  • StackMoonwalking: Leveraging SETFPREG frames with ROP to spoof the callstack at runtime
Presentations

Bsi

Managing Consultant - Research & Development

Sep 2018Dec 2024 · 6 yrs 3 mos · Rome, Latium, Italy

  • As a member of BSI's penetration testing team, I worked on a wide range of services that targeted all areas of an organization's security, including infrastructure, web applications, social engineering, and, of course, mobile across a multitude of industry sectors and regions.
EvasionEnablementAutomationC (Programming Language)PresentationsPenetration Testing

Dgs s.p.a.

IT Security Engineer

Oct 2016Aug 2018 · 1 yr 10 mos · Roma, Italia

  • My main role with the delivery team at DGS S.p.A. was to deliver varying types of security services, including penetration testing and vulnerability assessments, secure architecture design, configuration of security solutions and integration of security platforms, and even the implementation of custom security application for clients.
  • Interesting projects:
  • Built a closed source TNS dissector for packet-beat
  • Reverse engineered the undocumented HSM Luna EFT communication protocol and built a client to interface with it
  • Built a tool to integrate Rapid7 Nexpose with SkyBox Security Suite, also automating branded report genaration
AutomationC (Programming Language)IT Security Engineering

Techub s.p.a

Security Consultant

Dec 2011Oct 2016 · 4 yrs 10 mos · Roma

  • I was a member of the cyber security team at Techub S.p.A with a responsibility to deliver a large number of assessments both in the PA and commercial sectors for major customers (Poste Italiane SpA, Leonardo SpA, Autostrade SpA, Enel SpA) following a large number of security standards (OWASP, OSSTMM, ISO/IEC 27002, PCI-DSS, ISA-99, NIST, NERC). I was also responsible to lead a team of security analysts working in a H24 SOC environment with the responsibility to ensure the security of many thousands of servers and to deliver security analysis, proactive monitoring, incident response, procedure creation and security tools development activities.
  • Interesting projects followed:
  • Built a web based application to control perimetral routers, firewalls and IDS/IPS, automating report generation
  • Built an ML Classifier for new CheckPoint IPS Signatures, to automate response
  • Built a supervised system to classify and automatically analyse common load-based network attacks
AutomationSecurity Consulting

Freelance

Freelance Consultant

Sep 2010Dec 2011 · 1 yr 3 mos · Rome, Latium, Italy

  • I was working as a freelance consultant for private or enterprise. Working as a freelancer, I could expose myself to multiple environments and technologies, also gaining a very useful knowledge about IT companies internal policies and processes.
  • I've worked on many projects for different contractors, but the most interesting ones were the following:
  • Developed an Android mobile application for electric motorcycles, based on standard protocol OBD-II / ELM327 translation
  • Collaborating to the development of an AI system for pro-active frauds identification through e-commerce automated monitoring
AutomationC (Programming Language)Freelance Consulting

Education

University of Rome Tor Vergata

Master's degree — Computer Science

Jun 2023Jul 2025

University of Rome Tor Vergata

Bachelor's degree — Computer Science

Jan 2016Jun 2023

Stackforce found 100+ more professionals with Red Teaming & Adversary Simulation

Explore similar profiles based on matching skills and experience