Back to Browse
Sergio Albea

Sergio Albea

Threat Hunter & Researcher | User Behavior Analyst | Cyber Defense Enthusiast

๐Ÿ† Security
Switzerland 1 year as MVP SWITCH Official Profile

๐Ÿ“‹ Biography

My name is Sergio Albea and I'm originally from a tiny town called Valls, Spain, known for building the best human castles (called castells). About 15 years ago, I moved to Barcelona, where I had an amazing time both personally and professionally. Six years ago, I landed in Switzerland, where I am currently working as CSOC Security Expert, focus on threat analysis on SWITCH (Swiss NREN). With over 20 years of experience, I have immersed myself in the dynamic field of security, focusing on diverse IT landscapes and ensuring robust protection against threats and vulnerabilities. My approach is divided in proactivity, advanced analytics and architectural design to preemptively mitigate risks and fortify defenses against potential breaches. Throughout my career, I have had to secure and manage a myriad of IT environments such as messaging platforms, IAM systems, Information Protection mechanisms, DevOps, Azure Resources such as Databases, Networking, Storage, Scripting, and others.

โœจ High-Impact Contributions 5

💻 ThreatHunting Workshop at TF-CSIRT & FIRST Regional Symposium Europe February 2026

This is a practical Threat Hunting workshop where we’ll dive into real-world threat scenarios based on multiple cases observed during this 2025. Don’t worry if you’re not familiar with this topic — this workshop is designed for all skill levels, oriented to Threat Hunting, and we’ll start with a clear and simple introduction to basic detections so you can get comfortable before jumping into the action. What to Expect? Learn how to hunt for threats across different scenario such as: - Network-based threats - Identity-based anomalies - Host-based suspicious behavior - Apply Threat Intelligence on Threat Hunting - Explore how to turn raw data into real detections - Discover how to build your own hunting queries and detection rules Bring Your Laptop! You’ll need your computer — in the second part of the session, we’ll break into groups to solve real-world threat hunting cases using the tools and queries we explored during the presentation.

Speaker/Presenter at Third-party event
Feb 2026
EIC: Navigating Threat Response when Security Relies on User Behavior

In today’s digital landscape, relying solely on cloud providers for security can leave organizations vulnerable. This presentation aims to equip attendees with practical knowledge and strategies to enhance their threat response capabilities independently, especially when security relies on user behavior, by addressing critical areas including: - Identifying and mitigating threats where cloud providers cannot assist - Implementing robust in-house security measures and protocols with tools such as Microsoft DefenderXDR. We will also examine: - Case studies on successful threat responses where security relied on user behavior - Strategies to respond to user misconfigurations or bypassing of security baselines

Speaker/Presenter at Third-party event
May 2025
GCC: Navigating threat response beyond cloud provider support

In today’s digital landscape, relying solely on cloud providers for security can leave organizations vulnerable. This presentation aims to equip attendees with practical knowledge and strategies to enhance their threat response capabilities independently, especially when security relies on user behavior, by addressing critical areas including: Identifying and mitigating threats where cloud providers cannot assist Implementing robust in-house security measures and protocols with tools such as Microsoft DefenderXDR. We will also examine: Case studies on successful threat responses where security relied on user behavior Strategies to respond to user misconfigurations or bypassing of security baselines

Speaker/Presenter at Third-party event
Nov 2024
TF-CSIRT: Navigating Threat Response When Security Depends on User Behavior

In today’s digital landscape, relying solely on cloud providers for security can leave organizations vulnerable. This presentation aims to equip attendees with practical knowledge and strategies to enhance their threat response capabilities independently, especially when security relies on user behavior, by addressing critical areas including: Identifying and mitigating threats where cloud providers cannot assist Implementing robust in-house security measures and protocols with tools such as Microsoft DefenderXDR. We will also examine: Case studies on successful threat responses where security relied on user behavior Strategies to respond to user misconfigurations or bypassing of security baselines

Speaker/Presenter at Third-party event
Sep 2024
SCKIPT - When Security rely on user behavior

SCKIPT is an initiative created by Sergio Albea focus on detect possible User Behaviours which can put the security of our systems in risk. Nowadays, there are multiple scenarios where the security will rely on how the users interact with their manage systems. SCKIPT is oriented to list and provide possible measures to respond against the mentioned threats in scenarios where most of the possible activities by users are not blocked or limited. This model is not focused from the perspective of possible attacks by bad actors (of which there are multiple initiatives and models), it is focused on threats arising from possible actions by our users. Security Awareness is a mandatory requirement to decrease the possible threats related to user behaviours but it will never remove the risk. SCKIPT is oriented to list and provide possible measures to respond against the mentioned threats

Open Source/Project/Sample code/Tools
Jun 2024

Technology Focus

SIEM & XDR (Microsoft Sentinel & Microsoft Defender XDR suite)

Functional Roles

Researcher Consultant Content Creator Reporter

Languages

๐ŸŒ Catalan ๐ŸŒ English ๐ŸŒ French ๐ŸŒ Spanish

Stats

Contributions 5
Events 0
Social profiles 6
Years as MVP 1