Summary
Overview
Work History
Education
Skills
Accomplishments
Timeline
Generic

Claudian Chirita

Threat Analyst
Bucharest

Summary

Results-oriented Analyst skillful in managing and breaking down large volumes of information. Proactive at heading off issues in operations, workflow, and production by uncovering trends affecting business success.

Overview

4
4
years of professional experience

Work History

Threat Analyst III

CrowdStrike
11.2024 - Current
  • Enhanced the company’s macOS malware classification model by engineering new machine learning features informed by cybersecurity domain expertise.
  • Developed a custom Rust-based parser to extract Golang-specific metadata from Mach-O binaries, enabling the inclusion of Golang-related features into the ML model pipeline.
  • Designed and implemented features based on Mach-O code signature blobs, including entitlement analysis and signature type classification, significantly improving model precision.
  • Built a lightweight feature extraction engine in Rust to validate the impact of proposed features, presenting findings to cross-functional stakeholders.
  • Created a custom Rust disassembler for Python compiled (PYC) files, and developed a machine learning model to classify samples based on disassembled instruction sequences.

Threat Analyst II

CrowdStrike
08.2022 - 11.2024
  • Contributed to the threat emulation efforts for the MITRE ATT&CK® Enterprise Evaluation, partnering with a Red Team to assess and validate Falcon EDR capabilities against advanced threat scenarios.
  • Conducted deep research into the Tactics, Techniques, and Procedures (TTPs) of a designated Advanced Persistent Threat (APT), analyzing open-source intelligence (OSINT) and threat reports.
  • Designed and executed a custom kill chain, emulating the APT’s behavior by developing bespoke malware samples and C2 infrastructure using the same programming languages, API calls, and evasion techniques observed in real-world campaigns.
  • Supported the development and tuning of a macOS-focused machine learning detection model by analyzing false positives, reviewing model corpus data, and providing actionable feedback to data scientists and engineering teams.
  • Performed reverse engineering of macOS binaries to identify and correct model miss-classifications, enhancing detection accuracy in production environments.

Threat Analyst Intern

CrowdStrike
07.2021 - 05.2022
  • Gained hands-on experience with cybersecurity frameworks, such as MITTRE AT&CK, building foundational skills in threat analysis.
  • Developed practical expertise in detection engineering, including creating and deploying detection rules based on malicious process trees and behavioral indicators. Monitored deployed rules for performance and accuracy, and performed fine-tuning to reduce false positives detections.
  • Learned and applied reverse engineering techniques, performing both static and dynamic analysis to triage suspicious samples.

Education

Bachelor of Science - Computer Science

Military Technical Academy Ferdinand I
Bucharest
06-2022

Skills

Machine learning

Threat analysis

Rust Programming

Public Speaking - Presented at BSides Security event

Reverse Engineering

Accomplishments

Submitted two patents to the The United States Patent and Trademark Office.

Timeline

Threat Analyst III

CrowdStrike
11.2024 - Current

Threat Analyst II

CrowdStrike
08.2022 - 11.2024

Threat Analyst Intern

CrowdStrike
07.2021 - 05.2022

Bachelor of Science - Computer Science

Military Technical Academy Ferdinand I
Claudian ChiritaThreat Analyst