Kostas T.

Co-Founder

Vancouver, British Columbia, Canada3 yrs 3 mos experience

Key Highlights

  • Founder of a cybersecurity consultancy
  • Expert in incident response and threat intelligence
  • Experienced in training security teams
Stackforce AI infers this person is a cybersecurity expert specializing in threat analysis and incident response for enterprise environments.

Contact

Skills

Core Skills

Cybersecurity AdvisoryIncident ResponseThreat AnalysisNetwork SecurityLinux AdministrationEvent Analysis

Other Skills

Threat HuntingTrainingMentoringIncident RemediationCustomer ServiceSecurity AssessmentsHardware SupportDocumentation ManagementComputer networksComputer SecurityLinux System AdministrationCisco Routers and SwitchesInformation SecuritySecurity Information and Event Management (SIEM)Penetration Testing

About

Kostas is a seasoned security researcher with deep expertise in intrusion analysis, incident response, and threat intelligence. As an independent consultant, Kostas runs his own consultancy, partnering with businesses to improve detection and response capabilities.

Experience

3 yrs 3 mos
Total Experience
9 mos
Average Tenure
--
Current Experience

Defendpoint consulting

Founder & Principal Consultant

Jun 2024Present · 1 yr 11 mos · Vancouver, British Columbia, Canada · Remote

  • At DefendPoint Consulting, I provide independent cybersecurity advisory and technical services with a focus on endpoint protection, detection, and response. My work spans hands-on consulting, practitioner-led research, and mentoring security teams to strengthen their detection and response capabilities.
  • Key areas include:
  • Cybersecurity Advisory: Vendor-neutral guidance to help organizations evaluate, select, and optimize EDR and security solutions.
  • Threat Hunting & Incident Response: Supporting enterprises in building effective detection programs and responding to real-world intrusions.
  • Training & Mentoring: Delivering workshops, coaching, and lab-based training for security analysts and consultants.
  • Cybersecurity Advisory: Vendor-neutral guidance to help organizations evaluate, select, and optimize EDR and security solutions.
Cybersecurity AdvisoryThreat HuntingIncident ResponseTrainingMentoring

Undisclosed

4 roles

Cyber Threat Intelligence Analyst

Sep 2019Dec 2021 · 2 yrs 3 mos · Remote

Information Security Analyst

Oct 2018Sep 2019 · 11 mos · Remote

Information Security Analyst

Promoted

Feb 2018Aug 2018 · 6 mos · Wales, United Kingdom

  • In this role, I was a part of a SOC team on a 24/7 based shift pattern. One of my main responsibilities was to perform accurate and real-time analysis of threats and alerts from a multitude of client devices and systems. This required a wide range of skills, and the ability to work well under pressure to keep our customers’ systems and networks safe, all whilst being committed to the highest levels of customer service.
  • Some of my key responsibilities were:
  •  Monitor global Network Intrusion Detection Systems, Firewalls, and log correlation tools for
  • potential threats
  •  Initiate escalation procedures to counteract potential threats and vulnerabilities
  •  Provide incident remediation and prevention documentation
  • Part of my role was to collaborate with the Research Team in order to mitigate and avoid possible threats, system weaknesses, and controlled unaddressed security issues.
Threat AnalysisIncident RemediationCustomer ServiceIncident Response

Secure Operations Centre (SOC) Analyst (Contract role)

Apr 2017Sep 2017 · 5 mos · Manchester Area, United Kingdom

  • Part of a dynamic reactive SOC team working for a vibrant specialist IT Service Provider, I was providing an initial analysis of event data and network traffic, making security event determinations on alarm severity. This job was demanding a good working knowledge of administering Linux Servers that run various of services for the customers including but not limited to Firewalls, High-Availability clusters and Nagios monitoring system.
  • I was working in a fast paced environment with minimal supervision alternating within a 24/7 shift pattern. I was also analysing threats and vulnerabilities to improve the security posture of the company and its customers.
Event AnalysisThreat AnalysisLinux Administration

Undisclosed

Senior IT Technician (Temp role)

Sep 2017Jan 2018 · 4 mos · Manchester Area, United Kingdom

  • Responsible for maintaining, developing and enhancing the company's software and hardware infrastructure, I had the opportunity to provide Second/Third line support activities both on premises and remotely. I was confidently liaising with the IT director in regards to any updates or issues on a daily basis.
  • I was also responsible for to monitoring the network security, maintain a Linux based infrastructure and create as well as implement Information Security policies and processes.
  • Using tools such as NMAP, I performed security assessments in order to ensure the effectiveness of the security measures and to check for any potential misconfigurations that could lead to feature security incidents.
Network SecurityLinux AdministrationSecurity Assessments

Undisclosed

Technical Operations Technician (IT Support)

Feb 2016Apr 2017 · 1 yr 2 mos

  • Working within a small team, I was responsible for providing hardware support across computers, servers, printers, CCTV, security and audio visual equipment (amongst others). My role as a first line support required me to perform daily checks and back-ups as well as managing related documentation.
Hardware SupportDocumentation Management

Education

The University of Bolton

Bachelor of Science (BSc) (Hons) — Computer Networks And Security

Jan 2014Jan 2017

Stackforce found 100+ more professionals with Cybersecurity Advisory & Incident Response

Explore similar profiles based on matching skills and experience