Skip to main content
DFIRLab
ResearchIntel BriefingsPhishing CheckDomain LookupExposure ScannerPrivacy CheckAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

$_

Giuseppe Paternicola

Incident ResponderMalware AnalystForensic EnthusiastSwitzerland

A father, a tech guy, an incident responder, and a forensic enthusiast — with 15+ years turning complex IT and security incidents into actionable intelligence.

The Story
2010 — 2019 / The Foundation

My journey into IT started in 2010 at Galexis AG in Niederbipp, Switzerland's leading healthcare wholesaler. Over five years I progressed from system specialist to client engineer to system engineer — learning how large-scale infrastructure actually works from the inside out: data centre operations, SCCM environments, software packaging, and the day-to-day reality of keeping enterprise systems running.

In 2015 I moved to SRG SSR, the Swiss national broadcasting corporation, as a Workplace Engineer. Managing endpoints, mobile devices (Intune, AirWatch), and security concepts for a public media organization gave me my first real taste of how critical security posture is — and how often it's an afterthought.

From there I joined Avectris AG in Baden as a Senior System Engineer, leading client infrastructure projects, before moving to BDO AG in Solothurn where I took on client security hardening and SharePoint operations. Each role sharpened my understanding of enterprise architecture — and the attack surface it creates. By 2019, I had earned my OSCP certification, and the shift from building systems to breaking (and defending) them felt inevitable.

2020 — 2025 / The Front Lines

In 2020, I joined InfoGuard AG as a Security Engineer, and within two years transitioned into their CSIRT — the Computer Security Incident Response Team. For over three years, I was on the front lines: detecting, analyzing, containing, and recovering from security incidents for 300+ business customers across Switzerland, Germany, and Austria.

From ransomware investigations (Akira, Abyss) to Business Email Compromise analysis, from building internal CSIRT toolchains to technically managing Tier 2 analysts — every incident taught me something new. That curiosity is what drives this blog: turning real-world cases into research that helps the community.

15+Years in IT
300+Customers Served
3+Years on CSIRT
2024 — Present / The AI Chapter

Then, in early 2024, a new chapter opened. The AI revolution wasn't just a headline anymore — it was reshaping the way security professionals work, think, and build. I dove in headfirst.

What started as curiosity about OpenAI's ChatGPT quickly turned into an obsession with understanding the full landscape: Anthropic's Claude and Claude Code for pair-programming and deep reasoning, Cursor for AI-native development workflows, Google Gemini for multimodal research — I spent hundreds of hours exploring how these tools could amplify what a single security researcher is capable of.

ChatGPTClaudeClaude CodeCursorGeminiCopilot

The impact was transformative. Tasks that once took days — writing detection rules, triaging log volumes, prototyping tooling — suddenly collapsed into hours. I started building AI-augmented workflows for threat intelligence analysis, using LLMs to accelerate malware triage, and leveraging Claude Code to architect entire applications from the ground up.

This very blog is a product of that journey: a full-stack Next.js platform built with AI as a daily co-pilot, not a novelty.

I became convinced that the intersection of cybersecurity and AI is where the most meaningful work of the next decade will happen — and I wanted to be at that frontier, not watching from the sidelines.

>_

When I'm not chasing threats or prompting LLMs, you'll find me cycling uphill, snowboarding, or at the gym. I'm also the CTO and co-founder of aroundchess AG, a chess e-learning platform based in Zug — another project born from the conviction that AI can fundamentally change how we learn.

Areas of Expertise

Incident Response

End-to-end IR for enterprise environments

Malware Analysis

Static & dynamic analysis, reverse engineering

Threat Hunting

Proactive detection across endpoints & networks

Detection Engineering

YARA, Sigma, and custom detection rules

Digital Forensics

Disk, memory, and network forensics

Security Tooling

Python, Bash, PowerShell automation

Career Timeline
Sep 2025 — Present

Co-Founder & CTO

aroundchess AG

Zug, Switzerland

Building a chess e-learning platform from the ground up.

May 2022 — Aug 2025

Cyber Security Incident Responder

InfoGuard AG — CSIRT

Baar, Switzerland

Led incident response investigations for 300+ enterprise customers across Switzerland, Germany, and Austria. Developed EDR solutions, built internal CSIRT toolchains, conducted threat hunting and compromise assessments, and technically managed Tier 2 analysts.

Jun 2020 — May 2022

Security Engineer

InfoGuard AG

Bern, Switzerland

Security engineering in the Cyber Defence Center — detection, monitoring, and response services.

Mar 2019 — May 2020

Senior System Engineer

BDO AG

Solothurn, Switzerland

Enterprise infrastructure and system engineering.

Jul 2017 — Feb 2019

Senior System Engineer

Avectris AG

Baden, Switzerland

Workplace engineering and enterprise systems.

Mar 2015 — Jun 2017

Workplace Engineer

SRG SSR

Bern, Switzerland

IT operations for the Swiss national broadcasting corporation.

Jun 2010 — Feb 2015

System Specialist → System Engineer

Galexis AG

Niederbipp, Switzerland

Progressed from system specialist to client engineer to system engineer over five years.

Certifications & Education
OSCP2019

Offensive Security

GCFA2023

SANS / GIAC

PMAT2023

TCM Security

PCDRA—

Palo Alto Networks

Splunk Architect2021

Splunk

CAS Digital Forensics2022

Bern University (BFH)

ICT System & Network Technician — Federal Diploma (eidg. Fachausweis), IFA Zurich, 2017

Tools & Technologies
SplunkVelociraptorVolatilityGhidraYARASigmaWiresharkCyberChefX-WaysKali LinuxMetasploitBurp SuiteMITRE ATT&CKPythonPowerShell
$connect --with giuseppe

Let's Talk Security

Whether it's incident response, threat research, or just a good conversation about detection engineering — I'm always happy to connect.

LinkedInX / TwitterFull CV