Tomasz Targiel
usługi IT
About me
Background. My journey into cybersecurity is built on a unique foundation of a Bachelor's in Socioeconomics and an Engineering degree in Applied Computer Science from Wrocław University. This interdisciplinary background provides a distinct perspective on both the human and technical aspects of security.
Experience. My practical skills were sharpened during a cybersecurity-focused exchange at Saarland University, where I became an active member of the `saarsec` hacking team. Currently, I apply this knowledge as a Penetration Tester at ISEC, helping clients identify and mitigate real-world threats.
Approach. I approach every engagement with an analytical mindset, prioritizing methodical and detail-oriented work. From reconnaissance to reporting, I focus on delivering clear, actionable insights that empower organizations to strengthen their security posture effectively.
Beyond work. Biking and hiking keep me balanced. Exploring new trails and challenging myself outdoors is about pushing limits and continuous improvement - a philosophy I carry into my professional work.
My Pentesting Methodology
RECONNAISSANCE
Every engagement begins with meticulous planning and information gathering. I define the scope and rules of engagement, then use passive and active techniques to map your attack surface and identify potential entry points.
EXPLOITATION
With a clear picture of your environment, I simulate real-world attacks to exploit identified vulnerabilities. This phase is conducted safely and ethically to demonstrate impact without disrupting your operations.
ANALYSIS
Successful exploits are just the beginning. I perform post-exploitation analysis to determine the full extent of a potential breach, including privilege escalation, lateral movement, and data exfiltration capabilities.
DELIVERY
You receive a comprehensive report detailing all findings, their risk levels, and potential business impact. I provide clear, actionable recommendations for remediation to strengthen your security posture.
Services
I offer a range of offensive security services designed to identify and mitigate risks, tailored to your specific technology stack and business context.
Assessment of your cloud infrastructure (AWS, Azure, GCP) and network environments (e.g. Active Directory) for misconfigurations, excessive permissions, vulnerable services, and weak protocols. Recommendations are provided to secure your assets and comply with best practices.
Simulating real-world, objective-based attacks to test your organization's detection and response capabilities. Includes phishing, vishing, and physical security tests to evaluate your human firewall.