Community Platform
  • App development
  • Application development
  • Application Programming Interface (APIs)
  • Auditing
  • more...
This Year
270 Points
645 Points
MIS Badge

Click here
to validate the recipient

Blockchain and Web3 Security Research Extern

Webacy is a cutting-edge cybersecurity firm specializing in Web3 and blockchain security solutions. As a Blockchain and Web3 Security Research Extern, my overall role involved conducting thorough research on the latest security trends, vulnerabilities, and solutions within the Web3 space. My tasks included analyzing various blockchain technologies, identifying potential security flaws, and developing strategies to mitigate these risks.

Some of the Projects I’ve worked on:

  1. Competitive Analysis of Non-Mainstream Web3 Security Solutions:
    • Conducted in-depth research on non-mainstream Web3 security organizations.
    • Identified two key competitors, Status Research & Development GmbH and Pocket Universe, and analyzed their security features, business models, and user feedback.
    • Developed a comprehensive presentation comparing these solutions to Webacy’s offerings.
  2. Blockchain Technology Review:
    • Evaluated the security mechanisms of various blockchain platforms including Ethereum, Solana, and Polkadot.
    • Created detailed reports highlighting strengths and weaknesses, with a focus on smart contract vulnerabilities and potential attack vectors.

This externship provided invaluable practical experience directly related to my major in Management Information Systems. I applied theoretical knowledge from courses to real-world scenarios, enhancing my understanding of blockchain technology and security measures. I learned about the intricacies of Web3 security, the importance of proactive threat identification, and the development of robust security protocols. This experience has not only deepened my technical skills but also improved my ability to analyze complex security issues and develop effective solutions, which are critical competencies in the field of information security management.

Skip to toolbar