Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Jose Araujo

Senior Engineering Leader at NTT DATA

Santiago, Chile

With 20+ years of experience, I am a results-focused professional in telecommunications, cybersecurity, and management, backed by cross-technology certifications in Networking, Cybersecurity, Cloud, Automation, Team Leadership and Project Management. My career is dedicated to empowering people and delivering impactful solutions that boost operational efficiency, fortify security, and consistently surpass customer expectations.

My extensive experience has provided me with a deep understanding of business strategies and people management, enabling me to design, implement, and support a wide range of technology solutions. I thrive in leading high-performing teams, empowering individuals to surpass business goals while fostering a collaborative and inclusive work environment.

I am deeply committed to helping people, customers, and teams achieve exceptional results. With a relentless focus on driving customer experience and satisfaction, I continuously seek innovative approaches to meet their evolving needs. Leveraging my strong technical acumen and strategic mindset, I excel at developing, executing, supporting and leading technology solutions and high value services that not only align with organizational and business goals but also deliver tangible and measurable outcomes.

Top Certifications; 4x MCP | 5x CCNA | 3x CCNP | CCDP | CCAI | 3x CCST | 9x CCS | Devnet | C++CPA | DellEMC ISMv4 & Dell GenAI | NSE3/FCF/FCA | CMNA | ACE | DSP/DIS/DDIP | LCSPC™ | KIKF™| CSFPC™| 2x Scrum Master SMPC™

Jose Araujo Points
Academic 75
Author 19
Influencer 9
Speaker 138
Entrepreneur 0
Total 241

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Service Provider
Minimum Project Size: $100,000+
Average Hourly Rate: $300+
Number of Employees: 100,000+
Company Founded Date: 1952

Areas of Expertise

Agentic AI 30.10
AI 30.28
Cybersecurity 31.95
DevOps 35.74
Emerging Technology 30.28
Engineering 32.01
Generative AI 30.12
Innovation 35.09
IT Leadership 36.29
IT Operations 44
IT Strategy 35.38
Leadership 32.36
Mobility 31.94

Industry Experience

Publications

7 Academic Awards
Credly Top Legacy Badge Earner
Credly
October 18, 2024
This badge recognizes individuals as "Top Legacy Badge Earners" on Credly, celebrating those who have earned the most badges on the platform. As pioneers in learning and credentialing, these individuals showcase a deep commitment to mastering skills, driving innovation, and guiding others. Their achievements play a pivotal role in shaping the future of digital credentials and inspiring future learners.

See publication

Tags: Engineering

Credly Top Badge Earner of 2024
Credly
October 18, 2024
his badge recognizes an individual as a "Top Badge Earner of 2024" on the Credly platform, celebrating those who have earned the highest number of badges throughout the year. By earning a diverse range of badges, these individuals demonstrate a commitment to continuous learning and skill development. They are champions of new trends and foster growth in the digital credentialing ecosystem, contributing to innovation and lifelong learning.

See publication

Tags: Engineering

Infoblox Champion - Gold
Infoblox
March 15, 2022

See publication

Tags: Engineering

Devnet Class of 2020
Cisco Networking Academy
June 25, 2020

See publication

Tags: Engineering

Jury at "47th edition of EXPOCUNIBE"
CUNIBE
September 24, 2009

See publication

Tags: Leadership

Jury at "EXPOCUNIBE 2009"
CUNIBE
May 13, 2009

See publication

Tags: Engineering

Cisco Annual Conference: Designer Recognition for Case Study
Cisco Networking Academy
October 25, 2007

See publication

Tags: Engineering

19 Article/Blogs
GhostGPT: AI Tool for Cybercrime and emerging threat
Linkedin
January 26, 2025
The AI-Driven Evolution of Social Engineering Attacks.

We’re now witnessing the acceleration and growing sophistication of social engineering attacks, fueled by AI’s ability to craft highly personalized and scalable malicious campaigns.

As these threats evolve at lightning speed, traditional defenses may no longer be enough. Organizations must embrace AI-powered security solutions, raise cybersecurity awareness about these risks, and advocate for stronger regulations to curb the misuse of generative AI.

The question is not if these attacks will happen, its how prepared we’ll be to counter them.

See publication

Tags: AI, Cybersecurity, Leadership

Physical Security in a Digital World: The Flipper Tool's Role
Linkedin
January 12, 2025
Physical Security in a Digital World: The Flipper Tool's Role

When we talk about security, the focus is often on virtual threats-cybersecurity, data breaches, and malware. But physical security is just as critical, and tools like the Flipper Zero are a reminder of why.

The Flipper tool, known for its versatility, can copy physical keys, among many other capabilities. When combined with technologies like 3D printing, it opens up both exciting possibilities and significant risks. Imagine being able to replicate a physical key with just a scan and a printer. While the innovation is impressive, the potential misuse highlights a vital lesson: security isn't only about firewalls and passwords; it’s about physical plane too.

This is a call for greater awareness:

For organizations: Assess your physical security measures, especially for sensitive areas.

For individuals: Protect your physical keys and RFID devices as you would your passwords.

Security is a blend of virtual and physical safeguards. Are we prepared for this hybrid challenge?

See publication

Tags: Cybersecurity, Engineering, Leadership

Driving Engagement and Performance with a Noble Purpose: Lessons for Leading Technology Teams
Linkedin
January 05, 2025
Purpose-Driven Leadership: The Key to High-Performing Tech Teams

In today’s fast-paced world, high-performing teams aren’t just built on metrics and deadlines, they thrive on meaning and impact. When leaders articulate a purpose that connects the team’s work to a larger mission, magic happens:

Motivation soars as people feel their contributions matter.
Innovation thrives as teams focus on solving real problems, not just meeting quotas.
Customer satisfaction improves because the work aligns with their needs.

Having a clear purpose isn’t just a trendy idea, it’s the secret to building strong, united, and successful high performing tech teams.

See publication

Tags: Cybersecurity, Engineering, Leadership

Toyota’s A3 Thinking: A Blueprint for Engineering, Cybersecurity and GenAI Problem-Solving
Linkedin
December 29, 2024
In an era defined by rapid technological evolution and complexity, the principles behind Toyota’s A3 management process, as detailed in the MIT Sloan Management Review article "Toyota’s Secret: The A3 Report" by John Shook, offer profound insights. This structured, iterative approach to problem-solving is not just for manufacturing—it’s a game-changer for modern fields like engineering, cybersecurity and Generative AI.

See publication

Tags: AI, Cybersecurity, Engineering

Applying Execution IS the Strategy to Engineering, Cybersecurity and GenAI teams
Linkedin
December 22, 2024
Execution Meets Innovation in Cybersecurity & GenAI.

In my latest article, I dive into Laura Stack's book; "Execution IS the Strategy: How Leaders Achieve Maximum Results in Minimum Time" and explore how its principles transform leadership in the fast-evolving worlds for Enginering, Cybersecurity and Generative AI teams.

See publication

Tags: AI, Cybersecurity, Leadership

How websites keep your data safe with SSL Certificates
Linkedin
December 20, 2024
Ever wondered how websites keep your data safe?

It's all thanks to SSL certificates! Here’s a quick overview to make sense of the process:

How do SSL certificates work? Let’s simplify it!

Certificate Authority (CA):
It all starts with a trusted entity, the CA, that vouches for the authenticity of certificates (Imagine that trusted entity is like a Bank)
Private Key:
The server generates a private key, which is like a secret handshake to establish secure connections.
CSR (Certificate Signing Request):
Using the private key, the server creates a CSR containing details like the domain name, IP, and more. Think of it as an application for the certificate.
SSL Certificate:
The CA reviews the CSR and issues an SSL certificate, confirming the server's identity.
Application Integration:
The server installs the SSL certificate, enabling encrypted communication with browsers or applications.
Browser Validation:
Your browser recognizes the CA's signature on the certificate. If it’s valid, you’ll see the icon in the URL bar!

An error message when visiting a website—like "Certificate not trusted" or "Connection not secure"—can be more than just a technical glitch. It might be a red flag for a phishing attempt or an illegitimate website.

Bonus track:
Always double-check the URL. Look for subtle misspellings or extra characters that mimic legitimate domains (e.g., “paypa1.com” instead of “paypal.com”).
Stay vigilant and protect yourself from phishing attacks. If something feels off, it probably is. When in doubt, don’t share personal or financial information!

See publication

Tags: Cybersecurity, Engineering, IT Leadership

How Internet connects the World; Subsea cables
Linkedin
December 20, 2024
Do you know how the internet connects the world?

The internet we rely on every day isn’t just floating in the cloud, it’s connected by over 1.4 million kilometers of submarine cables running across the ocean floor!

These undersea marvels are the backbone of global communication, linking continents and enabling the seamless flow of data that powers everything from streaming movies to international financial transactions.

Take a look at this fascinating map that visualizes this hidden yet critical infrastructure. (Check the map link in the comments section)

It’s a testament to engineering ingenuity and global collaboration, quietly shaping our hyper-connected world.

Understanding these cables not only reveals the physical reality behind the internet but also highlights the importance of securing these lifelines against risks like natural disasters and cyber threats.

See publication

Tags: Engineering, IT Leadership, Leadership

Applied AI in Cybersecurity: The Double-Edged Sword of WormGPT
linkedin
December 15, 2024
Artificial Intelligence continues to transform industries, and cybersecurity is no exception. Among its most intriguing applications is WormGPT—a generative AI tool designed for offensive security and pentesting. While its potential to empower cybersecurity professionals is significant, it also underscores the pressing need to address new threats in a rapidly evolving digital landscape.

See publication

Tags: AI, Cybersecurity, Generative AI

Learning as a Superpower
Linkedin
December 12, 2024
We often spend 2 hours watching a great movie on Netflix, but imagine dedicating just 30 minutes daily to investing in yourself, learning something new, exploring your passions, or building a skill.

See publication

Tags: Cybersecurity, IT Leadership, Leadership

Driving Disruption in AI and Cybersecurity: Lessons from Greg Satell's "Mapping Innovation"
linkedin
December 08, 2024
Artificial Intelligence (AI) and Cybersecurity are at the forefront of technological transformation. But how can we truly disrupt these fields to create meaningful and lasting innovation? Greg Satell’s Mapping Innovation: A Playbook for Navigating a Disruptive Age offers valuable lessons that can guide us through this journey.

See publication

Tags: AI, Cybersecurity, Generative AI

Fostering Agility through Knowledge: Building Leadership for an Unpredictable World
linkedin
November 30, 2024
In today’s dynamic business environment, the ability to adapt, pivot, and thrive in uncertain conditions is no longer a luxury, it’s a necessity. Agility, once a buzzword, has evolved into a critical leadership trait. However, achieving agility isn’t just about ticking off a list of competencies. It’s about cultivating a mindset and skill set that empowers leaders to navigate volatility with confidence and purpose.

See publication

Tags: AI, IT Leadership, Leadership

Unlocking the Power of Learning in the Workplace: 7 Principles for Success
linkedin
November 24, 2024
In today’s fast-paced world, learning isn’t just an individual pursuit—it’s a critical business strategy.

Inspired by the book The Talent Powered Organization: Strategies for Globalization, Talent Management, and High Performance by Robert Thomas, these seven principles highlight how organizations can learn faster and better to achieve high performance

See publication

Tags: AI, IT Leadership, Leadership

Graphical representation of an Artificial Neural Network (ANN).
Linkedin
November 19, 2024
In this video, you can see a graphical representation of an Artificial Neural Network (ANN).

See publication

Tags: Agentic AI, AI, Generative AI

???????????????????????????????????? ???????????????????? ???????????????????????????? ???????????????????????????????????????????????????? ????????????????????????????
Linkedin
September 01, 2024
Harvard Business School showcasing the power of team empowerment, In the case of Tessei, a cleaning company for Japan’s Shinkansen bullet trains, success didn’t come from more resources—it came from empowering the team. Facing tight cleaning deadlines, high turnover, and customer complaints, the new Director, Teruo Yabe, focused on one key factor: ???????????? ????????????????????????.

See publication

Tags: Engineering, IT Leadership, Leadership

How to Protect yourself against malicious fake QR codes
Linkedin
July 17, 2024

Over the weekend, I took on a popular request from many of you who DM'd me. I decided to test the QR Scanner app by Trend Micro, available for both Android and iOS.

To conduct the test, I generated a harmless malicious QR code using a URL targeting EICAR simulating quishing attack. For those who aren’t familiar, EICAR is a standard test entity used to verify malware software effectiveness. It's safe and poses no threat to your devices.

The result? The app detected the malicious URL and promptly alerted me of the danger.

For added drama, I included a very obvious
danger symbol to QR code!

If you are wondering what is Quishing? is a form of phishing that uses QR codes to trick users into scanning them, leading to malicious websites or downloads. It’s a sneaky way for cybercriminals to steal personal information or infect devices with malware.

If you have more ideas on how to protect ourselves from Quishing attacks, drop them in the comments!

Don’t forget to share, repost and like this post for reach.

See publication

Tags: AI, Cybersecurity, Leadership

Beware of Fake QR Codes: A Growing Cybersecurity Threat
Linkedin
June 03, 2024

In recent times, QR codes have become incredibly common, especially in restaurants, stores, and various public places. They're convenient, contactless, and easy to use.

However, this widespread use has also caught the attention of cybercriminals who can exploit these codes for malicious purposes.

**The Threat:**
Malicious individuals can easily place fake QR code stickers over legitimate ones. When scanned, these deceptive codes can direct you to malicious websites, potentially stealing your personal information and downloading malware or viruses onto your device.

**How to Protect Yourself:**
1. **Inspect QR Codes:** Before scanning, look closely at the QR code. If it appears tampered with or looks like a sticker placed over another, avoid scanning it.
2. **Use Trusted Sources:** Only scan QR codes from trusted and verified sources. Be cautious of codes in unfamiliar or suspicious locations.
3. **Check the URL:** After scanning a QR code, verify the URL before taking any action. Ensure it matches the expected website and looks legitimate.
4. **Security Software:** Keep your device’s security software up-to-date to help detect and block malicious sites or downloads.
5. **Educate Yourself and Others:** Awareness is key. Share information about this threat with colleagues, friends, and family to reduce the risk for everyone.

**Vulnerability and Vigilance:**
With the rise of QR code usage in our daily lives, everyone is potentially vulnerable to these attacks. It’s crucial to stay vigilant and adopt best practices to protect against this growing threat.

Stay safe and secure while enjoying the convenience of QR codes! ️

See publication

Tags: Cybersecurity, IT Leadership, Leadership

Understanding Social Engineering in Cybersecurity
Linkedin
June 02, 2024
Understanding Social Engineering in Cybersecurity

Social engineering exploits human psychology to gain unauthorized access to systems and data. Here's a quick overview:

What is Social Engineering? Social engineering is a manipulation technique that tricks people into giving up confidential information. Attackers exploit trust, fear, or urgency to achieve their goals.

Common Types of Social Engineering:
-Phishing: Deceptive emails that appear legitimate.
-Vishing: Fraudulent phone calls seeking personal information.
-Smishing: Malicious text messages.
-Lure Attack: Abandoned USB drives with malware.
-Malicious Apps: Apps designed to steal data or install malware.

Protection Tips:
-Be Skeptical: Question unexpected emails, calls, and messages.
-Verify Sources: Contact the source directly using official channels.
-Educate Employees: Regular training on recognizing and avoiding scams.
-Use Security Tools: Implement email filters, antivirus software, and multifactor authentication.

Stay vigilant and protect your privacy!

See publication

Tags: Cybersecurity, IT Leadership, Leadership

Beware of QR Code Phishing (Quishing) Attacks!
Linkedin
May 22, 2024
Beware of QR Code Phishing (Quishing) Attacks!

As QR codes become increasingly ubiquitous, especially in settings like restaurants and retail establishments, it's more important than ever to stay vigilant against potential threats. QR code phishing, also known as "Quishing" – a malicious tactic employed by cybercriminals to conduct phishing attacks through seemingly innocuous QR codes.

How it works:

Scanning the Trap: You innocently scan a QR code, perhaps to access a menu or promotional offer.

Hooking the Victim: Unknown to you, the QR code redirects to a fraudulent website designed to steal your personal information or install malware on your device.

️ Proceed with Caution: Be cautious about which QR codes you scan and the websites they lead to. Avoid entering personal or sensitive information unless you're certain of the source's legitimacy.

With the prevalence of QR codes in our daily lives, it's easy to fall victim to these deceptive tactics. But by staying informed and exercising caution, we can thwart the efforts of cybercriminals and protect our digital identities.

Stay safe, stay vigilant! hashtag#Cybersecurity hashtag#innovation hashtag#letsconnect

See publication

Tags: Cybersecurity, Engineering, Leadership

True leadership isn't just about reaching personal goals, it's about fostering success in others.
Linkedin
May 08, 2024
As leaders, our impact extends far beyond our individual achievements. It's about the collective growth and success of our team.

When we prioritize the development and well-being of every member, we create a culture of support, collaboration, and empowerment.

Remember, being a leader of value means genuinely caring about the success of everyone on your team. Let's strive to inspire, uplift, and champion each other towards greatness.

Together, we can achieve extraordinary things!

See publication

Tags: IT Leadership, Leadership

3 Influencer Awards
Favikon Top #1 Creator in the Technology & Innovation in Chile
Favikon
February 05, 2025
Favikon is an AI-driven influencer marketing platform that helps brands discover, analyze, and connect with influencers. It offers tools for influencer search, analytics, CRM, and outreach. Favikon's technology and innovation ranking feature highlights top global influencers in the tech industry, categorized by engagement, followers, and influence. Using a tiered system, it ranks influencers based on their authority across social media platforms, providing valuable insights for effective marketing campaigns.

See publication

Tags: Innovation

Technical Star 2024
NTT DATA
January 24, 2024
This achievement is a deep honor for me and would not be possible without the incredible team I have the privilege of working with and serve.

See publication

Tags: Engineering

Linkedin Community Top Voice 2024 - Cybersecurity
https://www.linkedin.com/posts/josearaujo7_cybersecurity-leadership-gratitude-activity-7269062716105936897-C2Qp?utm_source=share&utm_medium=member_des
January 01, 2024
Linkedin Community Top Voice Cybersecurity (2023-2024) Program Duration and Active Status from January 2024 to December 2024

See publication

Tags: Cybersecurity

2 Instructors
Cisco Instructor 1 Year of Service
Credly by Pearson
June 20, 2024
The 1 year of service badge recognizes an instructor for joining Cisco Networking Academy and teaching the first instructor-led course. The badge is a welcome to the instructor and a recognition of the potential impact that each instructor can have on students and the communities in which they live.

See publication

Tags: Cybersecurity, Innovation, Leadership

Instructor Years of Services (University)
Cisco Networking Academy
February 02, 2015

See publication

Tags: Innovation

12 Keynotes
Inspiring the Next Generation of Tech Talent
Linkedin
November 01, 2024
A few days ago, I had the opportunity to take part in an enriching and inspiring experience with students and future talents in networking and technology at Cisco Chile’s offices.

We know the demand for tech talent is increasing, and it’s essential for young people to find inspiration and resources to embark on this path.
What better way to open doors to the world of technology than by sharing networking knowledge and exploring career options in this field!

Many thanks to Simon Azaharvich and the Cisco staff for the invitation and for supporting the development of future professionals. It was an honor to join them in this important mission.

See publication

Tags: AI, Cybersecurity, Engineering

Instructor at "Comprehensive technology day for high school students"
NTT DATA
January 18, 2024

See publication

Tags: Engineering, Innovation, Leadership

Speaker at "Wi-Fi Wireless Networks training"
Club Saber Electronica
September 13, 2008

See publication

Tags: Engineering, Innovation, Leadership

Speaker at "1st Comprehensive Training Program in Communications Technologies"
ANATEL
June 13, 2008

See publication

Tags: Engineering, Innovation, Leadership

Instructor at "Educational Informatics Training"
Universidad Rafael Belloso Chacin
August 15, 2006

See publication

Tags: Innovation, IT Leadership, IT Strategy

Speaker at "1st IEEE Membership Forum"
IEEE
April 21, 2006

See publication

Tags: Innovation, IT Leadership, Leadership

Speaker at "CTT Technical Conferences"
Universidad Rafael Belloso Chacin
October 15, 2005

See publication

Tags: IT Leadership, IT Operations, Leadership

Speaker and publication at "1st IEEE technical conference and 3rd regional meeting on electronics and systems"
IEEE
July 14, 2005

See publication

Tags: IT Leadership, IT Operations, Leadership

Speaker and publication at "3rd Electrical Engineering Conference JIELECTRIC 2005"
Universidad Rafael Belloso Chacin
June 27, 2005

See publication

Tags: Innovation, IT Strategy, Leadership

Speaker at "3rd Technical Conferences"
IEEE Venezuela
April 30, 2005

See publication

Tags: Cybersecurity, Innovation, Leadership

Speaker at "Microsoft .NET Day"
Universidad Rafael Belloso Chacin
April 11, 2005

See publication

Tags: DevOps, Innovation, Leadership

Speaker at "2nd IEEE technical conferences"
Universidad Rafael Belloso Chacin
November 13, 2004

See publication

Tags: Innovation, Leadership, Mobility

1 Media Interview
Cybersecurity and Self-Defend
https://www.linkedin.com/posts/ntt-data-inc_ciberseguridad-nttdatachile-nuevanormativa-activity-7199046459130830849-lSQN?utm_source=share&utm_medium=m
June 01, 2024
TV Interview about Cybersecurity and SelfDefence on Chilean WaPPTV

See publication

Tags: AI, Cybersecurity, Leadership

6 Speaking Engagements
Speaker at "Information Technology Conferences Series"
Universidad Rafael Belloso Chacin
September 26, 2007

See publication

Tags: Engineering, Innovation, IT Strategy

Speaker at "Internet Connectivity Solutions in SOHO Networks Training"
IEEE Maracaibo
July 07, 2007

See publication

Tags: Engineering, Innovation, Leadership

Speaker at "XXXIII Anniversary of the Maracaibo Institute of Technology"
Instituto Universitario de Tecnologia Antonio Jose de Sucre
May 07, 2007

See publication

Tags: Engineering, Innovation, Leadership

Speaker at "Fundamentals of Wireless Networks and Construction of Antennas"
IEEE Computer Society
June 17, 2006

See publication

Tags: Innovation, IT Leadership, Leadership

Speaker at "IUT Technical Conference"
Instituto Universitario de Tecnologia Antonio Jose de Sucre
October 22, 2005

See publication

Tags: Emerging Technology, Innovation, Leadership

Speaker at "CTT Technical Conferenes Series"
Universidad Rafael Belloso Chacin
August 04, 2005

See publication

Tags: Emerging Technology, Innovation, Leadership

Thinkers360 Credentials

10 Badges

Blog

Opportunities

Contact Jose Araujo

Book a Video Meeting

Media Kit

Share Profile

Contact Info

  Profile

Jose Araujo


Latest Activity

Search
How do I climb the Thinkers360 thought leadership leaderboards?
What enterprise services are offered by Thinkers360?
How can I run a B2B Influencer Marketing campaign on Thinkers360?