Tom Abai Profile

TOM ABAI

> _

Passionate and innovative Security Researcher, specializing in AI and Supply Chain security. Proven track record of conducting cutting-edge research into emerging security challenges.

STATUS: ACTIVE
LOCATION: IL/HAIFA
CLEARANCE: PUBLIC

[01] CORE_COMPETENCIES

🔒

LLM Security & Adversarial AI

Advanced research in AI model vulnerabilities, prompt injection, and adversarial attacks against large language models.

🔗

Supply Chain Security

Deep expertise in analyzing software supply chain threats, dependency vulnerabilities, and open-source security.

🐛

Vulnerability Detection

Published CVE researcher with proven ability to discover and analyze critical vulnerabilities in production systems.

🎯

Threat Intelligence

Malware analysis across multiple programming languages, threat hunting, and security incident documentation.

🔧

Security Tools Development

Python scripting, security automation, offensive security tools (Kali Linux), and vulnerability assessment frameworks.

🛡️

Open Source Threat Intelligence

OSINT methodologies, threat actor profiling, and intelligence gathering from public sources.

[02] PROFESSIONAL_EXPERIENCE

Security Researcher

Mend.io

Nov 2022 - Present
  • Research on malicious open-source packages and foundation models
  • Conducted in-depth analysis of vulnerabilities in open-source projects
  • Utilized AWS Bedrock models for advanced vulnerability scoring
  • Analyzed malware across multiple programming languages (C++, C#, Rust, JavaScript)
  • Collaborated closely with product and development teams to enhance security capabilities

Security Research Analyst

Mend.io

Aug 2020 - Nov 2022
  • Investigated daily published vulnerabilities in open-source ecosystems
  • Researched and developed methods to improve product security
  • Contributed to high-profile security advisories and bug bounty programs

Production Supervisor

Palram

Mar 2018 - Apr 2021
  • Enhanced production efficiency by 15% through Excel-based analytics
  • Led technical teams in plastic industry operations

Technical Specialist Team Leader

Palram

Apr 2012 - Mar 2018
  • Designed and assembled complex profiles for the plastic industry
  • Upgraded key department abilities and assembly time by 30%

[03] RESEARCH_HIGHLIGHTS

Supply Chain Incidents

In-depth analysis of supply chain security incidents, malicious packages, and emerging threats in open-source ecosystems.

View Articles →

Supply-Chain-Threat-Hunting Report

Comprehensive analysis of supply chain attack vectors and mitigation strategies. Published research documenting emerging threats in open-source ecosystems.

Read Full Report →

TECHNICAL_ARSENAL

Programming

Python Go JavaScript

Security Tools

Git Wireshark Metasploit Burp Suite IDA Pro Hugging Face Guardrails-AI

Languages

English (Fluent) Hebrew (Fluent)

[04] CERTIFICATIONS_&_TRAINING

2024

Practical Web Hacking

TCM Security

  • Web application vulnerability assessment
  • Hands-on methodologies for security testing
2024

Practical Bug Bounty

TCM Security

  • Web application vulnerability assessment
  • Hands-on methodologies for security testing
2023

Certified Malware Analyst Professional

MalwareAnalysis.co

  • 40 CEU Hours | Advanced static and dynamic malware analysis
  • Reverse engineering using IDA Pro
2022

Practical Ethical Hacking

TCM Security

  • In-depth network penetration testing
  • Web application security fundamentals (OWASP Top 10)
2022

Osint Fundamentals

TCM Security

ACADEMIC_BACKGROUND

Cybersecurity Diploma

Apr 2021 - Present

Cybint & 8200 Alumni Association

Postgraduate Diploma

  • Foundational training in network defense, ethical hacking, digital forensics
  • Threat intelligence and malware analysis

Bachelor of Arts

Oct 2017 - Jun 2020

Western Galil College

Academic Excellence: 85

MILITARY_SERVICE

Fighter - NAHAL Unit

3 years

Served with distinction in specialized combat operations

[05] ESTABLISH_CONNECTION

Open for security research collaborations, speaking engagements, and consulting opportunities. Let's discuss emerging threats and innovative solutions.

$ whoami

tom_abai

$ cat interests.txt

- Cybersecurity Research

- Capture The Flag (CTF) Competitions

- Computer Troubleshooting

- Continuous Learning in AI Technologies

$ status

● ONLINE - Ready for collaboration