Samuele Gugliotta
About Samuele Gugliotta
Samuele Gugliotta is a Security Researcher based in Rome, Italy, currently working at IBM as a Security Services Specialist. He has contributed to the cybersecurity community by authoring multiple CVEs and holds various roles, including Bug Bounty Hunter and active member of Hack The Box.
Work at Bugcrowd
Samuele Gugliotta has been employed as a Security Researcher at Bugcrowd since 2020. In this role, he focuses on identifying and reporting vulnerabilities in various systems. His work contributes to the overall security of software and applications, helping organizations to mitigate risks associated with cyber threats.
Current Roles and Responsibilities
Gugliotta currently holds multiple positions within the cybersecurity field. He works as a Security Services Specialist at IBM since 2021, where he provides security solutions. He is also an OWASP Member since 2020, contributing to open-source security projects. Additionally, he serves as a Hackfluencer at MyHackerTech.com and as a Bug Bounty Hunter at both HACKRATE and HackerOne, where he identifies vulnerabilities in various platforms.
Education and Expertise
Samuele Gugliotta studied at Istituto Volta, where he focused on IT Security. He achieved a Master in IT Security from 2017 to 2018. This educational background has equipped him with the necessary skills to excel in his roles within the cybersecurity sector, particularly in vulnerability assessment and penetration testing.
Background in Cybersecurity
Before his current roles, Gugliotta gained experience as a Penetration Tester at Sync Security Srl for eight months in 2020. He also worked as an IT Security Consultant from 2017 to 2019 and as an IT Security Specialist at Olympos Consulting s.r.l. from 2019 to 2020. His diverse background has contributed to his expertise in cybersecurity.
Contributions to Cybersecurity Community
Gugliotta has made significant contributions to the cybersecurity community by authoring multiple Common Vulnerabilities and Exposures (CVEs), including CVE-2020-27662 and CVE-2021-41139. He actively participates in platforms like Hack The Box, where he is recognized as an Elite Hacker and engages in Capture The Flag (CTF) competitions.