Konrad Papaj
Threat Hunter | Security Researcher | Cybersecurity Enthusiast
Warsaw, Poland | konrad.papaj@gmail.com | LinkedIn
Summary
Cybersecurity professional focused on threat hunting, incident response, and offensive security. Experienced in analyzing real-world threats, investigating security incidents, and improving detection capabilities across enterprise environments.
Strong hands-on background in pentesting, CTFs, and lab environments (Hack The Box, custom labs, exploit development). I enjoy the full cycle: finding vulnerabilities, exploiting them, understanding them deeply, and building detections to catch the same techniques in production environments.
Technical Skills
- Threat Hunting & DFIR: Incident Response, Threat Hunting, Digital Forensics, Malware Analysis, Phishing Analysis
- Security & Networking: MITRE ATT&CK, DPI, Network Protocols, SIEM, EDR
- Offensive Security: Penetration Testing, Ethical Hacking, Exploit Development
- Programming/Scripting: Python, Bash
- Other: Vulnerability Management, Threat Intelligence, Automation
Experience
Cyber Threat Hunting Specialist @ Standard Chartered
Warsaw - September 2025 -> Present
- Proactive threat hunting across enterprise endpoints, network telemetry, and cloud environments using EDR/XDR and SIEM platforms
- Developing and executing advanced hunting hypotheses based on current threat intelligence and emerging attacker TTPs
- Helping to create custom detection logic, behavioral analytics, and correlation rules to identify stealthy adversary activity
- Investigating complex security incidents, performing deep forensic analysis, and reconstructing attack chains
- Leveraging MITRE ATT&CK to map observed behaviors and improve detection coverage across the environment
- Building and maintaining threat hunting dashboards, queries, and automation in SIEM and EDR tools
- Collaborating with incident response, SOC, and threat intelligence teams to enhance detection and response capabilities
- Conducting log analysis across multiple data sources (endpoint, identity, network, cloud) to uncover hidden threats
- Developing automation scripts and tooling to improve hunting efficiency and repeatability
- Identyfying detection gaps and proposing improvements to monitoring, logging, and security controls
- Supporting purple team and adversary simulation exercises to validate detection engineering and response readiness
- Producing technical reports and briefings summarizing findings, risks, and remediation recommendations
- Tracking threat actor activity and integrating relevant intelligence into proactive hunting scenarios
Cyber Threat Response Analyst @ Standard Chartered
Warsaw - November 2024 -> September 2025
- Analyzing malicious emails and preparing investigation reports
- Monitoring and analyzing SIEM and EDR alerts
- Performing threat hunting and root cause analysis
- Identifying IOCs and attacker TTPs
- Participating in purple team exercises to improve detection and response
- Automating security tasks with scripts
- Participating in international cybersecurity conferences
Cybersecurity Analyst @ NASK S.A.
Warsaw - September 2023 -> November 2025
- Advanced malware analysis (static, dynamic, reverse engineering)
- Malicious email and attachment analysis
- SIEM monitoring and correlation rule tuning
- EDR alert analysis and incident investigation
- Network traffic and DPI analysis
- False positive verification (IPS/DPI)
- Conducting penetration tests
- Managing Threat Intelligence platform
- Creating SOC procedures and documentation
- Supporting onboarding of new team members
- Automation scripting
Certifications
- Certified Defensive Security Analyst (CDSA) – Hack The Box (2025)
- Certified Ethical Hacker Master (CEH + Practical) – EC Council (2024)
- Certified Cybersecurity Expert (CCE) – Blockchain Council (2024)
- TDX Arena Penetration Tester – ThriveDX (2024)
- Cybereason Threat Hunter (CCTH) – Cybereason (2024)
- Cybereason Threat Analyst (CCTA) – Cybereason (2024)
- Certified Cybersecurity Analyst (C)CSA – Mile2 (2023)
- Junior Penetration Tester – INE (2023)
- Red Team Cybersecurity Specialist – University of Warsaw & HackerU (2023)
CTF & Community
-
Hack The Box – Global Cyber Skills Benchmark CTF 2025
- Team rank: 38/796
- Challenges solved: 81/103
- Team MVP
-
Hack The Box – Cyber Apocalypse CTF 2025
- Team rank: 135/8130
- Challenges solved: 67/77
Education
- Bachelor’s degree in Cybersecurity
Wyższa Szkoła Kształcenia Zawodowego (2025 – in progress)
Links
Languages
- Polish — Native
- English — Fluent (B2/C1)