/Capabilities
Specialist gaining assurance in the security of an IT system by attempting to breach some or all of that system’s security, using the same tools and techniques as an adversary might. Focused on cloud pentest process
Expert in proactive and adversarial approach to protecting computer systems, networks and individuals from attacks. Measures focused on seeking out the perpetrators and in some cases attempting to disable or at least disrupt their operations.
Proactively search to detect advanced threats. Experience developing hunt missions, including find malware signatures. Use threat intelligence framework to detect suspicious/anomalous activity and identify threat actors. Apply skills to investigate intrusions and potential vulnerabilities.
High ability to respond adequately and begin mitigating the impact of an attack. Prepared to react quickly and effectively to a cybersecurity incident and benefit from proactive services that reduce the risk of damaging incidents and breaches.
Conducts intelligence analysis, deep search and public findings from threat actors in order to mitigate exploits to gain private information, access or valuables. Expert producing intelligence reports and responses recommendations
Experience in outage crisis. As time is of the essence during a ransomware attack, it is critical to pre-vet and pre-engage a team of professionals to monitor and be ready to respond to an attack when it happens.
BeyondTrust PowerBroker: O que é?
Linux Security Modules: O que é?
Advanced Persistent Threat: O que é e como se proteger?
Douglas Bernardini

Cybersecurity Specialist & Cloud Computing Expert with +10 years experience in IT infrastructure.
Specialist delivering assets for development teams in Google Cloud Platform (GCP) and Amazon web services (AWS)
Hands-on cloud security enterprise architect, with experience in SIEM/SOC, IAM, cryptography, pentest, network topologies, operating systems, databases, and applications.
Experience in DevSecOps analysis to discover vulnerabilities in software, identifying CI/CD risks gaps and recommending secure-coding process (S-SDLC).