RFS
Security Researcher
RFS is a Professional in Unified Communications Security, Signals Intelligence, and Red Team operations. He brings a wealth of experience to our penetration testing tools and articles.
Location
Portugal
Timezone
WET/WEST
Response
24-48 hours
Status
Available
Languages
"Security through transparency, education, and responsible disclosure. Every vulnerability discovered is an opportunity to make telecommunications networks more secure for everyone."
Industry-recognized certifications demonstrating expertise and commitment to continuous learning
eJPT
eLearnSecurity
eCPPTv2
eLearnSecurity
CRTP
Pentester Academy
ADCS CESP
Pentester Academy
NS1
Fortinet
NS2
Fortinet
IMS / SIP / VoLTE
Perpetual Solutions
Networks and System Expert
ATEC Academy
CCNA Academy Exploration
ATEC Academy
Comprehensive skills and experience in telecommunications security and related fields
Telecommunications Security
Deep knowledge of telecom protocols and security
SS7/SIGTRAN
Signaling System No. 7 and SIGTRAN protocols
Red Team Operations
Advanced persistent threat simulation
Penetration Testing
Comprehensive security assessment
Signals Intelligence
SIGINT and communications intelligence
Protocol Analysis
Deep protocol analysis and reverse engineering
Vulnerability Research
Zero-day vulnerability discovery and research
Career highlights and key milestones in cybersecurity and telecommunications security
Senior Penetration Tester - BSS
Executed comprehensive telecom security assessments on BSS.
Celfocus
Senior NGIN Analyst - Unified Communications
Managing and delivering Unified Communications projects to VF European Network
Celfocus
First free Call on Mobile phones + Free Internet Access.
!
Self
First free Call on fixed line .
!
Self
Deep expertise in specific domains of telecommunications security
Telecommunications Protocols
Expert in identifying and exploiting vulnerabilities in telecom signaling protocols
Mobile Network Security
Specialized in security assessment of mobile network infrastructure and protocols
Red Team Operations
Experienced in simulating advanced persistent threats and targeted attacks on critical infrastructure
Open-source security tools and frameworks developed for the community
Technical research papers, frameworks, and publications in telecommunications security
SS7 Protocol Vulnerabilities Analysis
Comprehensive analysis of SS7 protocol security weaknesses
5G Network Security Assessment Framework
Methodology for assessing 5G network security posture
Active research and development initiatives in telecommunications security
6G Security Research
Early research into 6G network security challenges
Quantum-Safe Telecom Protocols
Research into post-quantum cryptography for telecom
AI-Powered Security Testing
Integration of AI/ML into security testing frameworks
Presentations and participation in industry conferences and events
Malvertising
OWASP Porto • Oporto, PT
Industry recognition for contributions to cybersecurity and telecommunications security
Best Security Researcher
Recognition for outstanding contributions to telecom security
Issued by: Telecom Security Association
Innovation Award
For development of MOTIF Framework
Issued by: Cybersecurity Excellence Awards
Areas of personal interest and ongoing learning
Professional cybersecurity consulting for telecommunications and critical infrastructure
Response Time
24-48 hours
Status
Available
Location
Remote & On-site
Comprehensive cybersecurity services tailored to your organization's needs
Telecom Security Audits
Professional telecom security audits services with industry-leading expertise and proven methodologies.
Penetration Testing
Professional penetration testing services with industry-leading expertise and proven methodologies.
Security Training
Professional security training services with industry-leading expertise and proven methodologies.
Research Collaboration
Professional research collaboration services with industry-leading expertise and proven methodologies.
Tool Development
Professional tool development services with industry-leading expertise and proven methodologies.
Ready to enhance your security posture? Let's discuss your project requirements.