_<:

Michael Azoulay

Application Penetration Tester

Specializing in Web, API, Mobile, and Thick Client application security assessments.

Professional Summary

Michael is a penetration tester specializing in application security across Web, API, Mobile, and Thick Client environments. His work includes scoping, threat modeling, hands-on exploitation, proof-of-concept development, remediation guidance, and professional reporting.

His background combines client-facing application assessments with incident response, cyber threat intelligence, Python-based tooling, and security automation. He is currently advancing Red Team and Active Directory offensive capabilities.

Experience

Application Penetration Tester

MADSEC Security LTD - Tel Aviv

I perform application security assessments across Web, API, Mobile, and Thick Client environments, owning the testing lifecycle from scoping through exploitation, proof-of-concept development, and reporting.

The work includes identifying complex vulnerabilities beyond OWASP Top 10, including business logic flaws and authorization weaknesses, and collaborating directly with developers, DevOps, and product teams on remediation guidance.

Application Penetration Tester and Security Consultant

Freelance

I provide application security consulting. Among my clients: Plonter and R2M Group.

Engagements can include application security review, site feature consultation, and practical remediation guidance.

Cyber Security Analyst and Incident Response

N.E.S.S - Clalit Healthcare - Israel

My work focused on proactive threat analysis and incident response for cybersecurity events, helping protect healthcare data and infrastructure while investigating malware activity, network abnormalities, and breach attempts.

Developed custom tools and dashboards to improve detection accuracy and streamline investigations, and enriched cyber threat intelligence from sources including CERT-IL and NGOs into actionable recommendations for engineering and SecOps teams.

Security Operations Center Analyst

Citadel Cyber Security - Rehovot

I conducted threat analysis in a 24/7 environment, responded to alerts from multiple security systems, and documented security incidents in English and Hebrew.

Hands-on work covered EDR, SIEM, SOAR, firewall, cloud security, IDS, proxy, NAC, mail relay, sandboxing, ticketing, and Active Directory tooling across MSSP customer environments.

Computer Technician and Security Consultant

Plonter Technologies LTD - Tel Aviv District

Work included computer setup, system installation, hardware troubleshooting, BIOS and system support, client workstation specification, and automation scripts for system testing.

Computer Technician

Plonter Technologies LTD - Tel Aviv District

Supported computer setup, system installation, hardware installation, BIOS and system troubleshooting, and on-demand client workstation specifications.

Spokesperson Photographer

Magen David Adom in Israel - Tel Aviv District

Produced photography, videography, and editing for Magen David Adom operations and media.

Selected Projects

File Upload Testing

UploadBuster

Upload restriction testing utility for application security assessments.

View repository

TLS Analysis Tool

TLS Cipher Auditor

TLS cipher and protocol review for transport security audits.

View repository

Web Utility

XPath Grabber

XPath-oriented extraction of visible text elements from websites.

View repository

Local Security Tooling

LocalTool

Browser-based local utility for security workflow support.

Open project

Technical Profiles

Focus Areas

Application Security

  • Web Application Security
  • API Security
  • Mobile Application Security
  • Thick Client Security
  • Authentication and Authorization Testing
  • Business Logic Testing

Assessment Delivery

  • Scoping and Threat Modeling
  • Hands-on Exploitation
  • Proof-of-Concept Development
  • Vulnerability Validation
  • Remediation Guidance
  • Clear Technical Reporting

Supporting Capabilities

  • PortSwigger Burp Suite
  • Python Tooling and Automation
  • Incident Response
  • Cyber Threat Intelligence
  • Security Research
  • Offensive Lab Development

Training

Certified Red Team Professional (CRTP)

Altered Security

Current

Malware Analysis and Triage

TCM Security

2024

Mobile Application Penetration Testing

TCM Security

2023

CEH - Ethical Hacking

HackerU

2019 - 2020

Education

Cyber and Information Security

HackerU

Feb 2019 - Aug 2020

Covered networking foundations, Windows Active Directory, Linux and Bash, Python, application and infrastructure penetration testing, mobile penetration testing, and reverse engineering. Led activity on the HackerU CTF platform while completing the program.

Advanced Computer Installation and Repair Technology

Ness Digital Engineering

2013

Certified Advanced Computer Technician.

Contact

For application security assessments, consulting, or professional opportunities, use the contact details below.