Aaron Webb

Aaron Webb Email and Phone Number

The AI/Cybersecurity Nexus is my jam. @ Microsoft
Redmond, WA
Aaron Webb's Location
Seattle, Washington, United States, United States
Aaron Webb's Contact Details

Aaron Webb personal email

About Aaron Webb

I bring 20+ years of experience in the Information Security space. I have been called a Security Analyst, Software Engineer, Security Operations Engineer, Security Engineer, AppSec Engineer, Pentester, Forensics Engineer, Incident Responder, Security Manager, Connector, Coder, and Hacker. I have skills and experience in Application Security, Digital Forensics, Intrusion Detection, Security Integration Engineering, Pentesting, Machine Learning, and Team Building.

Aaron Webb's Current Company Details
Microsoft

Microsoft

View
The AI/Cybersecurity Nexus is my jam.
Redmond, WA
Website:
microsoft.com
Employees:
10
Company phone:
0124 415 8000
Aaron Webb Work Experience Details
  • Microsoft
    Senior Software Engineer (Security Operations)
    Microsoft Mar 2017 - Present
    Redmond, Washington, Us
    Led the unification a system that collected potential exposed secrets with a separate system that verified and remediated the exposure if a secret proved active. My identification of an overlooked path forward changed the chance of success from unlikely with complex engineering to certain with less engineering.Build, maintain and improve the systems and infrastructure that maintain Microsoft's endpoint protection; includes implementation of vulnerability detection, antimalware systems, tech eviction, associated data processing, monitoring and alerting. Mentored interns in projects related to our service. These included dynamic deployment of remote scanners to match target load; a system to detect errors in patch deployment; and a deep analysis of our scan reporting fidelity utilizing with statistical and machine learning techniques.Collaborated with a peer network security engineering group and coordinated with 3 more teams to deploy a network device security scanning solution with automation for scan targeting and cadence. Adjusted and redeployed several times to match new capabilities and shifts in the technology stack.Worked with my team to deploy a spark cluster solution to process the massive amounts of vulnerability and antimalware data generated into a consumable and actionable format. Includes end to end monitoring and alerting, environment classification, inventory processing, data engineering and feed consumption.Participated in an AI advanced projects class conducted through Microsoft Research (MSR). Was the information security subject matter expert in a group that created a Machine Learning solution for security vulnerability analysis. This solution was built around a Deep Neural Network and was integrated into Microsoft's cybersecurity product offering.
  • Berkeley Hacking Club
    Member
    Berkeley Hacking Club Jul 2023 - Present
  • Puget Sound Information Security Community
    Member
    Puget Sound Information Security Community Sep 1995 - Present
    Co-Founder Ghettohackers. Co-Founder Third Friday Group for locating security talent in Seattle Area. Self-Elected Webmaster for the Seattle 2600 in the late 90's:https://web.archive.org/web/19990508143149/http://www.2600.com/meetings/pages.htmlhttps://web.archive.org/web/19990203011002/http://www.seattleu.edu/~jester47/seattle2600.html
  • Caliber Security Partners
    Senior Pentester/Security Analyst
    Caliber Security Partners Jan 2016 - Jul 2016
    Everett, Washington, Us
    Conducted web application, network, social engineering, and other penetration tests to provide multiple clients with a better understanding of their security posture. Worked with clients to implement remediations and mitigations of issues discovered. Engaged in forensics and incident response work for a client with a virtualized network. Acquired forensic copies of virtual hard drives and reviewed these to confirm extent of breach using forensics analysis software. Gained the ability to jailbreak, disassemble and own an iOS app. Circumvented iOS cert-pinning, extracted information with OTool, Hopper, and keychain dumper. Regular utilization of Burpsuite Pro. Utilized proxychains, dnsChef and other tools for traffic redirection.Demonstrated the ability to turn tool output and information on the vulnerabilities discovered into actionable understandable reports. Constructed professional executive level reports of findings and offered support at the sales level to clarify technical questions and communications.
  • Caliber Security Partners
    Security Integration Engineer/Security Analyst (Microsoft Isrm/Dsre/Dsr)
    Caliber Security Partners Aug 2013 - Jan 2016
    Everett, Washington, Us
    Long term engagement with security division of client. Worked with the client's security monitoring group to tune their Intrusion Detection System (IDS). Reviewed and assessed rules and policies on a SourceFire/CISCO FirePower system along with changes in configuration to increase the signal to noise ratio in the detections. Wrote and deployed rules for the IDS as needed. Conducted extensive analysis of traffic using Wireshark, hex editors, and other network analysis tools to improve rules and detections. Built a suite of script applications that would connect with the CISCO FirePower devices to extract performance data with high granularity, deploy local rules to policy layers across a Defense Center environment numbering in the double digits, and correlated ArcSight ID to Defense Center IP for FirePower/ArcSight integration. Development of scripts reduced the time of deployment of custom rules from potentially hours to minutes and stabilized the ArcSight/FirePower environment.
  • Populus Group
    Information Security Analyst (Microsoft Msrc)
    Populus Group Feb 2013 - Aug 2013
    Troy, Michigan, Us
    Design, build and operate a program for third party outreach to identify and remove security vulnerabilities in Windows 8 apps. Exercised application security skills and experience to assess vulnerabilities discovered through the analyzer infrastructure. Utilized planning and management talents to reach out to the third-party developers and owners of these applications and help instruct them on how to correct the issues discovered.
  • Deepintel Solutions
    Security Analyst (Microsoft Gfs)
    Deepintel Solutions Mar 2011 - Sep 2012
    Woodinville, Wa, Us
    Reported vulnerabilities in a Federal/Accreditation environment and tracked them to resolution. Built, modified, and documented automation tools in VBA to streamline the production of daily, weekly, and monthly vulnerability reports to CVPs and engineers. These were used to report the security compliance and risk posture against established baselines. Worked with property owners to drive patching, configuration, and monitoring requirement compliance. Triaged and remediated breakdowns in the communication between teams to catalyze vulnerability remediation and security compliance. Work to satisfy and demonstrate audit compliance.
  • Zondervan Publishers
    Security/Qa Lead
    Zondervan Publishers Oct 2009 - Apr 2010
    Grand Rapids, Mi, Us
    Worked in a dual role as the lead for QA and Software Security on a social media subsidiary of Zondervan. Acted as the hub between the customer support and design/development teams to identify, prioritize, triage, and remediate bugs. Utilized RCOV, Tarantula, and Rake to review Ruby on Rails code for security bugs and raised application security awareness within the development team.
  • Expeditors International
    It Security Specialist
    Expeditors International Mar 2008 - Apr 2009
    Bellevue, Washington, Us
    The Majority of this role is related to reporting or managing vulnerabilities in a large-scale computing environment. Work on a team to protect the information network of a major global freight forwarder. Follow industry practices and use industry resources for risk management. Maintain 24x7 on call rotation. Respond to incidents and attack. Monitor snort/sourcefire data for intrusion. Upgraded and administered remote access VPN.
  • Excell Data Corporation
    Software Test Engineer (Microsoft Windows Setuphot)
    Excell Data Corporation Feb 2007 - Feb 2008
    Triage global windows setup errors in a large operational environment. Operate in a Tier 3 PSS role within the product group to triage driver-based deployment failures in setup.exe. Receive notification of errors in Setup from submitters and track Setup bugs across the windows development organization. Reviewed panther logs and used the WinDbg kernel debugger to analyze core dumps for root cause.
  • V-Empower Inc.
    Security Analyst (Microsoft Ace Team)
    V-Empower Inc. Apr 2004 - Jul 2006
    Bowie, Maryland, Us
    Perform comprehensive security assessments for line-of-business applications to asses architecture, code and design in a multi-language (.NET, SQL, VB, C++, C#, javascript, PHP) multi-development cycle environment. Project managed code reviews. Generated threat models utilizing data flow analysis tools. Drafted reports to communicate results across management and developers.

Aaron Webb Skills

Network Security Application Security Information Security Computer Security Web Application Security Forensic Analysis Pci Dss Penetration Testing Firewalls Security Sniffer Security Analysis Program Management Information Security Management Code Review Data Recovery Vpn Networking Computer Forensics Owasp Vulnerability Assessment Cat Herding Windows Internals Conflict Resolution Cross Team Collaboration Linux System Administration Cross Functional Team Leadership Threat Modeling Mac Os X Os X Servers Vba Packet Analysis E Discovery Intrusion Detection Payment Card Industry Data Security Standard Virtual Private Network Ios Security Cisco Firepower

Aaron Webb Education Details

  • University Of California, Berkeley
    University Of California, Berkeley
    Cybersecurity
  • Edmonds College
    Edmonds College
    Network Security And Digital Forensics
  • Seattle University
    Seattle University
    Minor In Computer Science
  • The Episcopal School Of Dallas
    The Episcopal School Of Dallas
    High School

Frequently Asked Questions about Aaron Webb

What company does Aaron Webb work for?

Aaron Webb works for Microsoft

What is Aaron Webb's role at the current company?

Aaron Webb's current role is The AI/Cybersecurity Nexus is my jam..

What is Aaron Webb's email address?

Aaron Webb's email address is al****@****ail.com

What schools did Aaron Webb attend?

Aaron Webb attended University Of California, Berkeley, Edmonds College, Seattle University, The Episcopal School Of Dallas.

What skills is Aaron Webb known for?

Aaron Webb has skills like Network Security, Application Security, Information Security, Computer Security, Web Application Security, Forensic Analysis, Pci Dss, Penetration Testing, Firewalls, Security, Sniffer, Security Analysis.

Who are Aaron Webb's colleagues?

Aaron Webb's colleagues are Professional Security, Peggy Jacobs, Robert E. M, Trishala Shankar, Saritha Prasad Vrittamani, Kuleen Bharadwaj, Tammi Broughton, Mba.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.