Adam has been in the IT security field for over a dozen years, both working in IT related positions and extending his knowledge and experience as part of his after-work activities. Currently working as a senior consultant in one of the big four companies, where he is responsible for enterprise cyber risk services such as penetration testing, red teaming and computer forensics etc.
During his infosec career he made expert opinions for law enforcement and justice authorities, worked as an ICT security specialist at a CSIRT team where he actively tracked cybercrime activity focusing on preventing attacks on government and critical infrastructure, and moreover, worked as a full time penetration tester for one of the world's largest banking groups, as well as performed penetration tests for other financial institutions (i.a. international banks, credit card issuer) and well known e-commerce companies.
Adam co-authored training materials for CERT teams in cooperation with European Network and Information Security Agency (ENISA) i.a. “Digital forensics” (Sep 2013; task 1-2) and “Identifying and handling cybercrime traces” (Sep 2013; task 1-2, appendix 1-3). He also took part in Cyber Europe 2014 exercise (in which over 100 teams from all around Europe participated), where his team scored first place.
He is a frequent speaker at TAPT (international scientific conference on “Technical aspects of ICT crime”) organized by Police Academy in Szczytno, as well as an IT Expert Witness (court expert) in the field of computer science at the District Court in Warsaw, with emphasis on general computer forensics, forensic analysis on Linux, hacking and cybercrime.
After work Adam is a successful bug hunter, who received acknowledgment and thanks from dozens of institutions and companies all around the world, i.a. and not only such as Adobe (2014), Apple (2012), BlackBerry (2013), Deutsche Telekom, eBay, Github, Harvard University (i.a. SSRF 0day in GeoNode), HBO, Heroku, LastPass, MyBB (CVE-2015-2149), Netflix (2013), Nokia (2013), OTRS (CVE-2014-1695 PoC, CVE-2014-2554), Prezi, Reddit, SoundCloud, VMware, Yahoo, Yandex (2013), as well as the Polish ones - Onet, Interia, Wirtualna Polska, Empik, Gadu-Gadu, Nasza-Klasa, Home.pl and much more. [bug bounty URLs accessed 13 Aug 2016]
He also holds several certificates of practical knowledge in ethical hacking such as Offensive Security Certified Professional (OSCP, May 2015), Offensive Security Wireless Professional (OSWP, Feb 2016), eLearnSecurity Web application Penetration Tester (eWPT, Jan 2016) and practical knowledge in computer forensics such as X-Ways Forensics (Mar 2012).
His experience and knowledge grants him an excellent understanding of both the attacking and defending sides of ICT security.