Profile picture

Hi, I'm Riccardo

I provide Offensive Security services to protect your business from cyber threats.

«Breaches don't just affect systems; they impact revenue, operations, and trust. I help companies uncover real attack paths and fix what truly matters, based on real-world experience.»

Scroll down

As a freelance, I worked for

A4e
A4e
Apple
Apple
Bugcrowd
Bugcrowd
Congeo
Congeo
Cyberdart
Cyberdart
Cybergon
Cybergon
Elmec
Elmec
GObugfree
GObugfree
Mariani
Mariani
Sayit
Sayit
Unguess
Unguess
A4e
A4e
Apple
Apple
Bugcrowd
Bugcrowd
Congeo
Congeo
Cyberdart
Cyberdart
Cybergon
Cybergon
Elmec
Elmec
GObugfree
GObugfree
Mariani
Mariani
Sayit
Sayit
Unguess
Unguess

Penetration Testing

Security assessments carried out on web, mobile, desktop applications and APIs through manual testing based on OWASP standards. The process leverages both white-box and black-box techniques to identify vulnerabilities, assess their impact, and deliver a comprehensive, professional report.

Learn more

Vulnerability Assessment

Identification, analysis, and prioritization of vulnerabilities across complex network environments. The assessment combines automated scanning with expert analysis to provide an accurate view of the organization’s security exposure.

Learn more

Framework Security

security assessment service focused on applications built using development frameworks or CMS platforms. The review focuses on configuration, exposed functionalities, known vulnerabilities, third-party components, and common misconfigurations.

Learn more

Continuous Monitoring

Continuous monitoring service for your corporate domain, constantly scanning your digital perimeter to identify and analyze all subdomains and exposed services. This approach combines automated tools with expert manual analysis to ensure a comprehensive security overview.

Learn more

IT Consulting

Tailored advisory services to meet your needs; whether it’s selecting the right security product, achieving compliance with industry standards, or strengthening your overall cybersecurity posture.

Learn more

OSINT Assessment

Collection and analysis of publicly available information to assess an organization’s digital exposure. The service focuses on identifying exposed credentials, data leaks, and other sensitive information accessible online, providing a clear overview of the organization’s digital exposure.

Learn more
Scroll down

Work Experience

Cyber Security Consultant

Sayit SA

Switzerland

Tailored advisory services to support regulatory compliance and strengthen cybersecurity posture, combined with technical expertise in penetration testing, vulnerability assessments, risk analysis, and secure development of management software.

ISO 27001NIS 2CompliancePenetration TestFileMaker

Software Security Consultant

IMQ Minded Security

Italy

Execution of security assessment projects, including web and mobile application penetration testing, source code review, and development of custom rules for SAST activities.

Penetration TestVulnerability AssessmentMAPTSASTSecure Code Review

Cyber Security Specialist

Elmec Informatica

Italy

Involved in comprehensive security operations, including proactive monitoring and management of SIEM, endpoint, network, and cloud security systems. Experienced in advanced incident response, threat hunting, and red teaming, as well as conducting penetration tests, vulnerability assessments, phishing simulations, and OSINT analyses.

SIEMThreat HuntingSOCIncident ResponseRed TeamingAutomation

Security Engineer

Secure Network

Italy

Conducting vulnerability assessments and penetration tests on applications, web services, and internal or external networks, following OWASP and OSSTMM methodologies, calculating risk using CVSS, and reporting identified vulnerabilities to support effective mitigation strategies.

Web Application SecurityAPI SecurityOWASPOSSTMMRisk Analysis
Scroll down

Studies and Certifications

B.S. in Computer Science

Università Degli Studi Dell'Insubria

Core CS foundations: data structures, algorithms, operating systems, networking, and databases; team capstone in web systems.

Algorithms Data Structures Operating Systems Databases Networking

EWPT

eLearnSecurity

Certified in web application penetration testing, demonstrating expertise in identifying and exploiting security vulnerabilities in web applications.

Web Application Penetration Test Certification OWASP

Lead Auditor ISO/IEC 27001:2022

Gerico Security Srl

Qualified to lead and conduct ISO 27001 audits on information security management systems.

ISO 27001 Compliance Internal Audit
Separator