Adam Ziaja has been in the IT security field for over a dozen years, both working in IT related positions and extending his knowledge and experience as part of his after-work activities. Currently working as an Independent IT Security Consultant at Red Team (B2B freelancer, VAT-UE and VAT-PL) with services such as penetration testing, red teaming, cyber threat hunting i.a. intelligence (CTI), computer forensics and incident response (DFIR).
During his infosec career he made expert opinions for law enforcement and justice authorities, worked as an ICT security specialist at a CSIRT (aka CERT) team where he actively tracked cybercrime activity focusing on preventing attacks on government and critical infrastructure, and moreover, worked as a full time penetration tester for one of the world's largest banking groups, as well as performed penetration tests for other financial institutions (i.a. international banks, payment card issuer) and well known e-commerce companies. Last times he worked as senior cyber security consultant at one of the big four companies, where he was responsible for enterprise cyber risk services such as penetration testing, CPH red teaming and DFIR.
Adam co-authored training materials for CERT teams in cooperation with European Network and Information Security Agency (ENISA) i.a. “Digital forensics” (Sep 2013; task 1-2) and “Identifying and handling cybercrime traces” (Sep 2013; task 1-2, appendix 1-3). He also took part in ENISA Cyber Europe 2014 exercise (in which over 100 teams from all around Europe participated), where his team scored first place.
Author of the book “Praktyczna analiza powłamaniowa. Aplikacja webowa w środowisku Linux” (“Practical computer forensics analysis. Web application on Linux”), 2017 Polish Scientific Publishers PWN. He is also a frequent speaker (every year since 2014) at international scientific conference on “Technical aspects of ICT crime” (TAPT) organized by Polish Police Academy, as well as an IT Expert Witness in Poland, in the field of computer science at the District Court in Warsaw, with emphasis on general computer forensics, forensic analysis on Linux, hacking and cybercrime.
After work Adam is a successful bug hunter, who received acknowledgment and thanks from dozens of institutions and companies all around the world, i.a. and not only such as Adobe (2014), Apple (2012), BlackBerry (2013), Deutsche Telekom, eBay, Github, Harvard University (i.a. SSRF 0day in GeoNode), HBO, Heroku, LastPass, MyBB (CVE-2015-2149), Netflix (2013), Nokia (2013), OTRS (CVE-2014-1695 PoC, CVE-2014-2554), Prezi, Reddit, SoundCloud, VMware, Yahoo, Yandex (2013), as well as the Polish ones – Onet, Interia, Wirtualna Polska, Empik, Gadu-Gadu, Nasza-Klasa, Home.pl and much more. [bug bounty URLs accessed 13 Aug 2016]
He also holds several certificates of practical knowledge in ethical hacking such as Offensive Security Certified Professional (OSCP, May 2015), Offensive Security Wireless Professional (OSWP, Feb 2016), eLearnSecurity Web application Penetration Tester (eWPT, Jan 2016) and practical knowledge in computer forensics such as X-Ways Forensics (Mar 2012).
His experience and knowledge grants him an excellent understanding of both the attacking and defending sides of ICT security.