Skip to main content
DFIRLab
ResearchUse CasesCompare
Intel BriefingsThreat Actors
IOC CheckFile AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab

Security research, threat intelligence, and free DFIR tools.

Tools

Phishing CheckerExposure ScannerDomain LookupFile AnalyzerPrivacy CheckAPI Playground

Use Cases

SOC Phishing TriageIR IOC EnrichmentMSSP Exposure Monitoringn8n AutomationSee all use cases →

Compare

vs VirusTotalvs Shodanvs TheHiveSee all 8 →

Resources

DFIR WikiIntel BriefingsAboutPlatformAPI Docs

Legal

Privacy PolicyRSS FeedSitemap

© 2026 DFIR Lab. All rights reserved.

$_

Giuseppe Paternicola

Incident ResponderMalware AnalystForensic Enthusiast

A father, a tech guy, an incident responder, and a forensic enthusiast — with 15+ years turning complex IT and security incidents into actionable intelligence.

The Story
2010 — 2019 / The Foundation

My journey into IT started in 2010 at Galexis AG, a leading healthcare wholesaler. Over five years I progressed from system specialist to client engineer to system engineer — learning how large-scale infrastructure actually works from the inside out: data centre operations, SCCM environments, software packaging, and the day-to-day reality of keeping enterprise systems running.

In 2015 I moved to SRG SSR, a national broadcasting corporation, as a Workplace Engineer. Managing endpoints, mobile devices (Intune, AirWatch), and security concepts for a public media organization gave me my first real taste of how critical security posture is — and how often it's an afterthought.

From there I joined Avectris AG as a Senior System Engineer, leading client infrastructure projects, before moving to BDO AG where I took on client security hardening and SharePoint operations. Each role sharpened my understanding of enterprise architecture — and the attack surface it creates. By 2019, I had earned my OSCP certification, and the shift from building systems to breaking (and defending) them felt inevitable.

2020 — 2025 / The Front Lines

In 2020, I joined InfoGuard AG as a Security Engineer, and within two years transitioned into their CSIRT — the Computer Security Incident Response Team. For over three years, I was on the front lines: detecting, analyzing, containing, and recovering from security incidents for 300+ business customers across Central Europe.

From ransomware investigations (Akira, Abyss) to Business Email Compromise analysis, from building internal CSIRT toolchains to technically managing Tier 2 analysts — every incident taught me something new. That curiosity is what drives this blog: turning real-world cases into research that helps the community.

15+Years in IT
300+Customers Served
3+Years on CSIRT
2024 — Present / The AI Chapter

Then, in early 2024, a new chapter opened. The AI revolution wasn't just a headline anymore — it was reshaping the way security professionals work, think, and build. I dove in headfirst.

What started as curiosity about OpenAI's ChatGPT quickly turned into an obsession with understanding the full landscape: Anthropic's Claude and Claude Code for pair-programming and deep reasoning, Cursor for AI-native development workflows, Google Gemini for multimodal research — I spent hundreds of hours exploring how these tools could amplify what a single security researcher is capable of.

ChatGPTClaudeClaude CodeCursorGeminiCopilot

The impact was transformative. Tasks that once took days — writing detection rules, triaging log volumes, prototyping tooling — suddenly collapsed into hours. I started building AI-augmented workflows for threat intelligence analysis, using LLMs to accelerate malware triage, and leveraging Claude Code to architect entire applications from the ground up.

This very blog is a product of that journey: a full-stack Next.js platform built with AI as a daily co-pilot, not a novelty.

I became convinced that the intersection of cybersecurity and AI is where the most meaningful work of the next decade will happen — and I wanted to be at that frontier, not watching from the sidelines.

>_

When I'm not chasing threats or prompting LLMs, you'll find me cycling uphill, snowboarding, or at the gym. I'm also the CTO and co-founder of aroundchess AG, a chess e-learning platform — another project born from the conviction that AI can fundamentally change how we learn.

Areas of Expertise

Incident Response

End-to-end IR for enterprise environments

Malware Analysis

Static & dynamic analysis, reverse engineering

Threat Hunting

Proactive detection across endpoints & networks

Detection Engineering

YARA, Sigma, and custom detection rules

Digital Forensics

Disk, memory, and network forensics

Security Tooling

Python, Bash, PowerShell automation

Career Timeline
Sep 2025 — Present

Co-Founder & CTO

aroundchess AG

Building a chess e-learning platform from the ground up.

May 2022 — Aug 2025

Cyber Security Incident Responder

InfoGuard AG — CSIRT

Led incident response investigations for 300+ enterprise customers across Central Europe. Developed EDR solutions, built internal CSIRT toolchains, conducted threat hunting and compromise assessments, and technically managed Tier 2 analysts.

Jun 2020 — May 2022

Security Engineer

InfoGuard AG

Security engineering in the Cyber Defence Center — detection, monitoring, and response services.

Mar 2019 — May 2020

Senior System Engineer

BDO AG

Enterprise infrastructure and system engineering.

Jul 2017 — Feb 2019

Senior System Engineer

Avectris AG

Workplace engineering and enterprise systems.

Mar 2015 — Jun 2017

Workplace Engineer

SRG SSR

IT operations for a national broadcasting corporation.

Jun 2010 — Feb 2015

System Specialist → System Engineer

Galexis AG

Progressed from system specialist to client engineer to system engineer over five years.

Certifications & Education
OSCP2019

Offensive Security

GCFA2023

SANS / GIAC

PMAT2023

TCM Security

PCDRA—

Palo Alto Networks

Splunk Architect2021

Splunk

CAS Digital Forensics2022

University CAS Programme

ICT System & Network Technician — Federal Diploma, 2017

Tools & Technologies
SplunkVelociraptorVolatilityGhidraYARASigmaWiresharkCyberChefX-WaysKali LinuxMetasploitBurp SuiteMITRE ATT&CKPythonPowerShell
$connect --with giuseppe

Let's Talk Security

Whether it's incident response, threat research, or just a good conversation about detection engineering — I'm always happy to connect.

LinkedInX / TwitterDiscord