curriculum vitae

Roger Cato Bergheim Johnsen

Lead Security Architect - Threat Informed Defense

Location: Kongsvinger & Oslo, Norway

Birth: 1982


Summary

Roger is a cybersecurity leader and practitioner with broad experience across Security Operations, threat hunting, penetration testing, and software development. He currently serves as Lead Security Architect – Threat Informed Defense at Orkla IT, where he designs secure architectures, builds detection capabilities, and mentors teams in SOC, threat intelligence, and vulnerability management.

He is the author of “The Huntbook by Predefender ”, an online resource for professionalizing threat hunting and incident response. In addition, Roger develops proof-of-concept security tools such as Wraithbind (a Rust-based C2/threat emulation platform) and Sentifender Lexica Detectica (a Streamlit app for exploring Microsoft Defender/Sentinel schemas). Predefender is Rogers personal initiative to both drive innovation and teach threat hunting to the masses.

With a strong background in information security consulting and hands-on programming, he combines strategic vision with technical depth. A passionate Capture The Flag (CTF) participant and reverse engineer, Roger thrives at the intersection of red and blue teaming, bringing creativity, precision, and persistence to solving complex security challenges.

Contact

Media
Phone+47 91800451
E-mailrogercbjohnsen@gmail.com
LinkedInhttps://www.linkedin.com/in/rogerjohnsen/

Experience

Orkla IT

Lead Security Architect - Threat Informed Defense

June 2025 - present

In this role, I focus on designing secure, scalable, and resilient architectures that incorporate threat intelligence and adversary behavior insights. My work emphasizes proactive threat detection through intelligence-driven threat hunting and purple teaming, helping to strengthen the organization’s detection and response capabilities. I collaborate closely with cross-functional teams to ensure security is embedded throughout the technology lifecycle and aligned with business objectives.

I also support knowledge sharing across the organization by mentoring teams in SOC operations, threat intelligence, and vulnerability management, and by fostering a culture of secure design. Through regular technical risk assessments and targeted mitigation strategies, I help identify and address security gaps. Staying ahead of emerging threats is a core part of the role, and I continuously adapt our defenses to meet the demands of a dynamic threat landscape.

Achievements: Introduced the company to Threat Informed Defense through threat intelligence, log investigation, pentest and curiosity- Have uncovered severe vulnerabilities in current infrastructure.

Head of Cyber Security Operations

March 2024 - June 2025. Oslo, Norway

As Head of Cyber Security Operations at Orkla IT in Oslo, Norway, I lead a dedicated team of security experts specializing in SOC, penetration testing, and SAP security. Drawing on my background in threat detection and incident response, I have successfully shaped strategic security initiatives to safeguard the company and its customers. My focus on developing a resilient and proactive team has been instrumental in addressing complex security challenges and creating a robust security posture

Achievements: Restructured my department with focus on delivering operational security and consultancy work. Focused SOC into proactive manners and investigation (Threat Hunting), incorporating routines and processes. Tidying the department budget.

SOC Analyst

October 2023 - June 2025. Oslo, Norway

In my role as a SOC Analyst at Orkla IT in Oslo, Norway, I spearheaded the development of threat detection and incident management efforts within the Security Operations Center. By leading a team of analysts, I focused on enhancing our proactive approach to identifying and mitigating threats across diverse environments. My hands-on involvement in threat hunting, SIEM tuning, and escalation processes aimed to improve SOC efficiency and effectiveness, ultimately strengthening our security posture and supporting the organization’s security goals

Achievements: Focused SOC into proactive manners and investigation (Threat Hunting), incorporating routines and processes. Trained analysts in advanced topics such as reversing, analysis and threat hunting.

Defendable AS (former BDO Cybersecurity)

Senior Security Analyst September 2020 - September 2023. Oslo, Norway

In my role as a Senior Security Analyst at BDO Cybersecurity (now Defendable AS), I focused on coaching and educating SOC analysts while building threat hunting capabilities within the organization. After the transition to Defendable AS in 2021, I took on dual roles: working as a Threat Hunter to identify intrusion artifacts alongside the SOC team and serving as Head of Training to guide and develop analysts into top-tier SOC professionals.

Achievements: I designed and led Defendable’s annual internal SOC education conference, an intensive eight-day program for analysts and employees. The conference featured expert-led sessions on malware analysis, log analysis, and operational technologies, significantly enhancing team expertise and collaboration.

Pedab Norge

Security Analyst MSS November 2017 - August 2020. Oslo, Norway

In my role as a Security Analyst MSS at Pedab Norge, I had the opportunity to build a SOC from scratch, utilizing IBM QRadar for monitoring network activities and analyzing security incidents. I developed processes for daily analysis, aided customers in incident handling, and led the creation of integrations for enhanced analysis work.

Achievements: Built a SOC from scratch, onboarding new analysts, automation through Python scripting

Watchcom Security Group AS

Information Security Consultant September 2015 - November 2017. Oslo, Norway

In my role as an Information Security Consultant at Watchcom Security Group AS, I spearheaded the transition of the Vulnerability Management service “Graywolf” to Tenable products. Managing server and scanner stacks, I assessed vulnerabilities through manual testing and provided crucial support to customers. Additionally, I played a key role in validating alerts and incidents in Watchcom’s SIEM offering as 2nd line support, while also implementing enhancements to the SOC process

Achievements: Restructured vulnerability management service, rebuilt and enhanced SOC service.

Protego AS

Senior Security Consultant February 2015 - August 2015. Oslo, Norway

In my role as a Senior Security Consultant at Protego AS, I focused on enhancing cybersecurity measures through penetration testing, vulnerability scanning, and security consulting for clients. I played a key role in developing and improving security services, contributing to the overall success of the company. Company defunct as of Aug. 2015 due to bankrupcy.

Achievements: Penetration tested companies with regards to network, services and web.

Making Waves

Senior Systems Consultant September 2011 - January 2015. Oslo, Norway

In my role as Senior Systems Consultant at Making Waves AS, I specialized in Security, focusing on improving software development processes. I managed in-house penetration testing using tools like Acunetix Web Vulnerability Scanner, BurpSuite, custom tools, and browser extensions. I also researched attack vectors, delivered presentations, and published materials to enhance the organization’s security, improving the overall security profile of the development process. In addition, I worked as a web developer in the Open Source PHP department, primarily focusing on the LAMPP stack. I used tools such as Acunetix, PHP XML, MySQL, Apache, MongoDB, eZ Publish, Apache JMeter for load testing, EPiServer, ElasticSearch, and .NET 4.x

Achievements: Started incorporating security into the development process in forms of vulnerability scanning, loadtesting and unit testing.

bMenu

Software Developer and implementing agile processes December 2010 - September 2011. Oslo, Norway

In my role as a Software Developer at bMenu, I collaborated with the development team to enhance product functionality in PHP and C#. I also played a key role in implementing agile processes, drawing from my experience with eXtreme Programming and Scrum. Additionally, I set up continuous integration servers, Git repository servers, and Zend Server CE webservers to streamline development processes and improve efficiency

Achievements: Implemented agile methodologies

Fronter

Web developer & team leader March 2007 - November 2010. Oslo, Norway

In my role as a web developer and team leader at Fronter AS in Oslo, I focused on extending and implementing new features on the learning management system product. I advanced to team leader, overseeing the Scrum process for a six-person development team and an eleven-person team in total.

Achievements: Lead a developer team.

Hontas AS

Systems Developer September 2005 - December 2006. Kongsvinger, Norway

In my role as a Systems Developer at Hontas AS, I extended and improved the functionality of a hospital product range, including a handheld terminal and workstation. I developed a messaging extension for a custom C++ web browser on the handheld device and collaborated on the development of a mobile app using C# for Siemens Doculive.

Achievements: First professional job, learned a lot about how hospitals are runned.

Diakron Programvare

CEO/Programmer May 2005 - June 2006. Kongsvinger, Norway

Founded a software company during college, developing a PHP-based CMS, “ekorn::websystem”, inspired by concepts from a JSP-based college project

Achievements: Learned to manage my own company.

Education

YearSchoolStudy
2002 - 2005Hedmark University of Applied SciencesComputer Science 
2001 - 2002Øvrebyen Videregående SkoleKongsvinger Allmenfag påbygging 
2000 - 2001Kongsvinger Tekniske Fagskole (VGS)Computer and office equipment repairs
1999 - 2000Kongsvinger Tekniske Fagskole (VGS)Electronics
1998 - 1999Kongsvinger Tekniske Fagskole (VGS)Electronics/electric appliances

Certifications

A small selection of relevant certifications. For more certifications and information, please see my LinkedIn page.

CertificationIssued byIssued
Intelligence-Driven Threat Hunting - MalwareIntel 471Jun 2025
Threat Hunting Management: Structuring Collaboration Across TeamsIntel 471Jun 2025
Threat Hunting - Discovery (Level 1)Intel 471Nov 2024
Threat Hunting - Collection (Level 1)Intel 471Oct 2024
Foundations of Operationalizing MITRE ATT&CK v13AttackIQMar 2024
Cyber Threat ManagementCyber Threat ManagementCiscoAug 2023
Mapping MITRE ATT&CK to CVE for ImpactMapping MITRE ATT&CK to CVE for ImpactAttackIQJul 2023
Microsoft Certified: Security, Compliance, and Identity Fundamentals SC-900MicrosoftMar 2023
Microsoft Certified: Security Operations Analyst Associate SC-200MicrosoftFeb 2023
Certified Ethical Hacker (CEH)EC-CouncilJun 2019

Publications

Technical

Threat Hunt Book

Predefender.com · Sep 10, 2024 → Ongoing.

The Predefender Threat Hunt Book is a comprehensive online resource dedicated to threat hunting, created for cybersecurity professionals looking to deepen their understanding of threat detection and response. It combines structured guidance with practical insights, providing an accessible yet in-depth look into the methodologies, tools, and strategies used in modern threat hunting.

Malware Reversing

The Malware That Wasn’t" - an article on how I reverse engineered a malware sample sent to me.

Other

Series on mindset and thinking

A collection of articles focused on how and ways we think. In many ways the precursor of my work at Defendable and culminated in the “Threat Hunt Book” (2024). Articles released on Medium.com between May 2020 - Aug. 2020.

Personal Projects

Wraithbind C2

Ongoing · 2025 → present

Wraithbind is a proof-of-concept Command and Control (C2) and threat emulation platform, developed in Rust with a Node.js/Vue.js operator interface. It explores secure and resilient communication channels using Nostr (NIP-04 encrypted messaging) and IPFS for decentralized bootstrap and resource distribution.
The project demonstrates advanced knowledge of adversary emulation, modular agent design, and backend/API development, and forms part of the Predefender research portfolio aimed at enhancing detection and response capabilities. Not publicly available / available upon request.

Sentifender Lexica Detectica

Ongoing · 2024 → present

Sentifender Lexica Detectica is a Streamlit-based application that provides a searchable reference for Microsoft Sentinel and Defender data tables and schemas. The app enables users-especially threat hunters-to explore relationships between tables with example Kusto queries and pivot points for easier navigation through the data landscape. Publicly available on sentifender.streamlit.app

Languages

LanguageProficiency
EnglishProfessional Working
Norwegian (bokmål)Norwegian Native