Adnan Beciri

Cybersecurity Engineer IT/OT

Security specialist bridging IT and operational technology environments, with a track record of leading offensive and defensive initiatives for critical infrastructure operators.

Summary

Cybersecurity engineer with deep experience across industrial control systems, cloud, and enterprise networks. Balances offensive testing with architecture guidance to reduce risk, harden operations, and accelerate detection and response.

Adept at translating complex threats into actionable roadmaps, leading cross-functional teams, and delivering measurable security improvements for high availability environments.

Experience

Lead Cybersecurity Engineer

ABB AB | 2022 - Present

  • At ABB, I work as a Cyber Security Lead Engineer, focusing on product and system security for industrial control systems.
  • My focus is on embedding security into product development, coordinating testing and certification, and driving continuous improvement in secure engineering practices.
  • I work closely with R&D teams to align security requirements with IEC 62443-4-1 and 4-2 standards.
  • I collaborate with cross-functional teams globally to enhance ABB’s security posture and product resilience.

Offensive Security Consultant

Vector Red Team | 2019 - 2022

  • I’m responsible for the cybersecurity engineering of ABB’s industrial control products, including security testing, threat analysis, and secure development practices.
  • My focus is on embedding security into product development, coordinating testing and certification, and driving continuous improvement in secure engineering practices.
  • I work closely with product teams to integrate security requirements into the development lifecycle and ensure compliance with industry standards.
  • I collaborate with cross-functional teams globally to enhance ABB’s security posture and product resilience.

Security Analyst

Blue Shield SOC | 2016 - 2019

  • Designed detection rules for ICS protocol anomalies and lateral movement, expanding detection coverage by 40 percent.
  • Implemented purple team drills that mapped MITRE ATT&CK techniques to mitigations and response playbooks.
  • Automated tier one triage with Python and PowerShell, eliminating repetitive manual review tasks.

Highlighted Projects

Industrial Honeynet

Deployed a public ICS honeynet that captures adversary tradecraft and provides daily telemetry for the community to analyze.

View on GitHub

Threat Modeling Playbook

Lightweight framework for capturing attacker objectives and defensive countermeasures across OT zones and conduits.

View on GitHub

Skills

Core Security

  • Penetration testing
  • Red team operations
  • Security architecture
  • Threat modeling

Platforms

  • ICS and SCADA
  • Azure and AWS
  • SIEM (Splunk, Sentinel)
  • Containers and Kubernetes

Languages and Tools

  • Python, PowerShell, Bash
  • Burp Suite, Nessus, Metasploit
  • Wireshark and Zeek

Certifications and Education

  • Product Cyber Security, Expert Learning Lab (2025)
  • GICSP (GIAC), 2022
  • OSCP (OffSec), 2019
  • Cyber Security Engineer, Academic Work Academy, Sweden (2022)
  • Cyber Security Specialist, Stockholms Internationella Handelskola (2018-2020)
  • Ethical Hacking, EC-Utbildning (2017)