CV
Here you will find a brief overview of my professional background, including key experience, research interests, and technical skills. You can download the full detailed PDF version of my resume by clicking the PDF icon.
Basics
| Name | Javier Parada |
| Label | Cybersecurity Researcher & Software Engineer |
| javierparada@pm.me | |
| Url | https://javierparada.phd |
| Summary | A cybersecurity researcher and software engineer from Spain, recognized for work in cyber-intelligence, threat hunting, and high-availability system design |
Work
-
2023.01 - 1955.01 Cybersecurity Researcher
NicsLab - Research Group
Research in cybersecurity with a strong emphasis on Cyber Threat Intelligence and Adversary Emulation applied to Critical Infrastructures.
- Cyber Threat Intelligence
- Adversary Emulation
- Critical Infrastructures
Volunteer
-
2014.04 - 2015.07 Zurich, Switzerland
Lead Organizer
People's Climate March
Lead organizer for the New York City branch of the People's Climate March, the largest climate march in history.
- Awarded 'Climate Hero' award by Greenpeace for my efforts organizing the march.
- Men of the year 2014 by Time magazine
Education
-
1905.01 - 1905.01 Zurich, Switzerland
Awards
- 2025.06.06
Outstanding Master's Thesis Award
RENIC Awards for the Best National Master's Degree Thesis
Honored with the RENIC Cybersecurity Award for the Best National Master's Degree Thesis in Spain, granted by the Red de Excelencia Nacional de Investigación en Ciberseguridad (RENIC).
Certificates
| Blockchain Technologies | ||
| University of Malaga | 2025-07-01 |
| 日本語能力試験 N3 | ||
| The Japan Foundation | 2025-01-01 |
Publications
-
2025.09.01 Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks
ESORICS 2025
The paper proposes a framework that uses digital twins to emulate adaptive cyber adversaries in industrial IIoT control networks. The approach creates a virtual replica of the industrial system where auto‑ mated attackers, driven by reinforcement learning, interact with the environment and adapt their strategies to identify and exploit critical nodes. By combining system modeling with structural analysis and adversarial learning, the framework enables the generation of realistic and dynamic attack scenarios without impacting real industrial infrastructure. This environment can be used to evaluate defensive mechanisms, analyze sys‑ tem resilience, and support proactive cybersecurity testing in critical industrial networks
Languages
| Spanish | |
| Native speaker |
| English | |
| Fluent |
| Japanese | |
| Fluent |
| Basque | |
| Native speaker |
Interests
| Physics | |||||||
| Quantum Mechanics | |||||||
| Quantum Computing | |||||||
| Quantum Information | |||||||
| Quantum Cryptography | |||||||
| Quantum Communication | |||||||
| Quantum Teleportation | |||||||
References
| Professor John Doe | |
| Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam condimentum, diam quis convallis euismod, arcu mi ullamcorper lorem, a vestibulum nunc magna at sem. Sed in risus ac felis varius blandit. D |
| Professor John Doe | |
| Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam condimentum, diam quis convallis euismod, arcu mi ullamcorper lorem, a vestibulum nunc magna at sem. Sed in risus ac felis varius blandit. D |
Projects
- 2018.01 - 2018.01
Quantum Computing
Quantum computing is the use of quantum-mechanical phenomena such as superposition and entanglement to perform computation. Computers that perform quantum computations are known as quantum computers.
- Quantum Teleportation
- Quantum Cryptography