Zero Day Engineering
Alisa Esage is a pioneering leader in cybersecurity, and an active hacker at the top of the elite technical field. She may consider a guest appearence at your event with plenty of notice, granted a good opportunity to represent leading edge computer security research, as well as gender diversity in cybersecurity. All public engagements will require a speaker's honorarium.
We specialize on cutting edge offensive security research, including zero days, non-trivial exploit development, black box reverse engineering and theoretical modeling. We excel at solving some of the hardest challenges in the field, while exploring both classic and emerging systems of computation. Contractual research availability will depend on topical alignment of your project with our interests.
The knowledge that we operate on makes headlines and elicits massive funding by governments. It is a system that spans inner workings of cybersecurity industry to hypervisor CPU-level shellcodes and beyond. Technical consultations may be available under a yearly contract.
Our training programs are trusted by professionals from leading technology companies. Private onsite or online training can be arranged for any program in our catalog, with a minimum of 10 students. The training can be held at your location, or at a venue of your choice. Availability is limited and primarily reserved for governmental entities.
Zero Day Engineering training system is bridging the gap between the university system's degrees in Computer Science and specialized requirements of the cybersecurity industry. We are open to collaboration with accredited academic institutions and researchers to advance SOTA in both technical research and education. You can invite us for a lecture, or discuss an opportunity to teach our programs in your department.
Zero Day Engineering founder Alisa Esage was featured in leading international press such as Forbes, New York Times, The Guardian, as well as in specialized cybersecurity news outlets. She is recognized as one of the top experts in zero day attacks and vulnerability exploits. Feel free to request a technical quote or propose a media feature.
We build unique systems of knowledge for professional security researchers, based on cutting edge research outputs from our own labs. Security conference organizers and cybersecurity integrators are welcome to reach out.