Reverse engineer. Preferences in reversing differ from large and multi-component systems to large and multi-component systems. His dull office job is the analysis of various telecommunication, ICS and banking (ATM, POS) systems from their embedded components to large application servers. When not in office he is entertained by reverse engineering of various telecommunication, ICS and banking (ATM, POS) systems. Usually answers questions “How it works”, but also can answer questions “How to break it” and “Where is the nearest bar” if somebody is brave enough to insist. Alexander found numerous vulnerabilities in products of Siemens, NCR, Honeywell, Emerson, Yokogawa, ABB, etc. Member of SCADA StrangeLove team. Presented talks at international security conferences: Positive Hack Days and ZeroNights.