PhD · Senior Security Researcher
Estonia
Senior Security Researcher at Dynatrace, focusing on threat intelligence research, vulnerability analysis, and observability. Previously worked as a Senior Systems Engineer at Podium North and as a Technology Researcher at the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). Experience includes contributing to the technical development of cybersecurity exercises such as Locked Shields and Crossed Swords, and delivering training sessions on Network Security Monitoring tools including Suricata and Arkime. PhD in Cybersecurity from Tallinn University of Technology, with research focused on automating cyber defenses and advancing autonomous systems in cybersecurity.
Estonian Academy of Sciences
Dynatrace
CTI research, collection and analysis, vulnerability and threat detection research, data pipelines.
Podium North, Estonia
Managing and improving complex cloud-based systems with the focus on cyber security.
NATO Cooperative Cyber Defence Centre of Excellence
Technology research, cyber security exercises, hands-on trainings — network and host-based security monitoring, defense automation, data collection and analysis.
Foundation CR14, Estonia
Researcher (participation in EDF calls).
Tallinn University of Technology, Estonia
ITX8071: Cyber Defense Monitoring Solutions course.
MicroLink Eesti AS / Elion Ettevõtted AS, Estonia
Comprehensive monitoring with Nagios, OpsView, Cacti and various other monitoring tools.
MicroLink Eesti AS, Estonia
Data Center specialist focusing on DC and server maintenance.
Tallinn University of Technology
Thesis: Automating Defences against Cyber Operations in Computer Networks
Tallinn University of Technology & University of Tartu
Thesis: A Comparative Analysis of Open-Source Intrusion Detection Systems
Estonian Information Technology College
Thesis: Expanding Functionality of the Robot Control Platform of The Estonian IT College
Full list and citation metrics on Google Scholar. Selected PDFs available for download.
Next Steps in Cyber Blue Team Automation — Leveraging the Power of LLMs
17th International Conference on Cyber Conflict: The Next Step (CyCon), 2025
LSPR23: A Novel IDS Dataset from the Largest Live-Fire Cybersecurity Exercise
Journal of Information Security and Applications, 85, 103847, 2024
Open Source Intrusion Detection Systems' Performance Analysis Under Resource Constraints
IEEE 22nd Jubilee International Symposium on Intelligent Systems and Informatics (SISY), 2024
Comparative Analysis of Pattern Mining Algorithms for Event Logs
IEEE International Conference on Cyber Security and Resilience (CSR), 2023
Request for a Surveillance Tower: Evasive Tactics in Cyber Defense Exercises
15th International Conference on Cyber Conflict: Meeting Reality (CyCon), 2023
Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal
14th International Conference on Cyber Conflict: Keep Moving! (CyCon), 2022
Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber Exercises
IEEE International Conference on Cyber Security and Resilience (CSR), 2021
PDFAutomating Defences against Cyber Operations in Computer Networks
PhD Thesis, Tallinn University of Technology
PDFIDS for Logs: Towards Implementing a Streaming Sigma Rule Engine
NATO CCD COE Publications, 2020
NetFlow Based Framework for Identifying Anomalous End User Nodes
15th International Conference on Cyber Warfare and Security (ICCWS), 2020
Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems
In: Adaptive Autonomous Secure Cyber Systems, Springer, 2020
An Introductory Preview of Autonomous Intelligent Cyber-defense Agent Reference Architecture, Release 2.0
The Journal of Defense Modeling and Simulation, 17(1), 2020
Autonomous Intelligent Cyber-Defense Agent (AICA) Reference Architecture, Release 2.0
Technical Report, CCDC Army Research Laboratory, 2019
Design and Implementation of an Availability Scoring System for Cyber Defence Exercises
International Conference on Cyber Warfare and Security (ICCWS), 2019
Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense
arXiv preprint arXiv:1803.10664, 2018
Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: The NATO AICA Reference Architecture
International Conference on Military Communications and Information Systems (ICMCIS), 2018
EVE and ADAM: Situation Awareness Tools for NATO CCDCOE Cyber Exercises
SCI-300 Specialists' Meeting on Cyber Physical Security of Defense Systems, 2018
Frankenstack: Toward Real-time Red Team Feedback
IEEE Military Communications Conference (MILCOM), 2017
Event Log Analysis with the LogCluster Tool
IEEE Military Communications Conference (MILCOM), 2016
Hedgehog in the Fog: Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels
NATO CCD COE Publications, 2016
Service Measurement Map for Large-Scale Cyber Defense Exercises
IST-148: Cyber Defence Situation Awareness, NATO STO, 2016
PDFCreating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels
Nordic Conference on Secure IT Systems (NordSec), 2016
LogCluster — A Data Clustering and Pattern Mining Algorithm for Event Logs
11th International Conference on Network and Service Management (CNSM), 2015
Insider Threat Detection Study
NATO CCD COE Publications, 2015
Mitigating Risks Arising from False-Flag and No-Flag Cyber Attacks
NATO CCD COE Publications, 2015
Using Security Logs for Collecting and Reporting Technical Security Metrics
IEEE Military Communications Conference (MILCOM), 2014
Back-Tracing and Anonymity in Cyberspace
In: Peacetime Regime for State Activities in Cyberspace, NATO CCD COE Publications, 2013
PDFA Comparative Analysis of Open-Source Intrusion Detection Systems
MSc Thesis, Tallinn University of Technology & University of Tartu
PDFRed Hat Certified Specialist in Security: Linux
Red Hat Certified Engineer (RHEL7)
Red Hat Certified System Administrator (RHEL7)
GIAC Continuous Monitoring Certification (GMON)