AeroLeads people directory · profile

Amit S. Email & Phone Number

Hardware and Software hacker, reverse engineer, Security research leader, public speaker at CrowdStrike
Location: Boston, Massachusetts, United States 16 work roles 2 schools
2 work emails found @cybereason.com LinkedIn matched
4 data sources Profile completeness 100%

Contact Signals · 2 work emails

Work email a****@cybereason.com
LinkedIn Profile matched
3 free lookups remaining · No credit card
Current company
Role
Hardware and Software hacker, reverse engineer, Security research leader, public speaker
Location
Boston, Massachusetts, United States

Who is Amit S.? Overview

A concise factual answer block for searchers comparing this professional profile.

Quick answer

Amit S. is listed as Hardware and Software hacker, reverse engineer, Security research leader, public speaker at CrowdStrike, based in Boston, Massachusetts, United States. AeroLeads shows a work email signal at cybereason.com and a matched LinkedIn profile for Amit S..

Amit S. previously worked as Security Research Lead at Crowdstrike and Director, Security Research at Sternum. Amit S. holds Political Science And International Relations (Incomplete) from The Open University Of Israel.

Company email context

Email format at CrowdStrike

This section adds company-level context without repeating Amit S.'s masked contact details.

{first}@cybereason.com
89% confidence

AeroLeads found 2 current-domain work email signals for Amit S.. Compare company email patterns before reaching out.

Profile bio

About Amit S.

I've been a hacker and a reverse engineer since I can pretty much remember myself. Started using FreeBSD when I was 13, compiling custom kernels, running 4 servers in my teen-age bedroom and learning how TCP/IP works and what I could with it (and in some cases, to it).My 'official' career started when I was 18 in the Israeli intelligence community, where I worked until I was 27 doing anything from hardware hacking, vulnerability research and exploit development to designing architectures of uniquely complicated, highly reliable, one-of-a-kind communication systems. During my 9 year tenure in the IDF and Israeli government I've received 4 certificates of excellence and two commendations.During my career I've been on both of the red and blue sides, joined an early stage start-up where I spent 6 years building EDR products from scratch on various operating systems, conducted low level operating system research, reverse engineered malware, performed countless IR engagements, helped building a global research team and brand, and stopped a few global attacks (NotPetya, BadRabbit, Operation softcell to name a few).I am a frequent public speaker at security conferences all over the world and I'm proud to share my research and knowledge in various blog posts, conferences, and podcasts.

Listed skills include Linux, Information Security, Network Security, Security, and 46 others.

Current workplace

Amit S.'s current company

Company context helps verify the profile and gives searchers a useful next step.

CrowdStrike
Crowdstrike
Hardware and Software hacker, reverse engineer, Security research leader, public speaker
Website
AeroLeads page
16 roles · 20 years

Amit S. work experience

A career timeline built from the work history available for this profile.

Security Research Lead

Current

Remote, US

I am back to being an individual contributor and I have the privilege of working with a bunch of extremely talented people on solving complex security issues around the world of Linux (low and high level) and cloud computing. In my role I am conducting, leading, and directing research projects and helping to set up Crowdstrike's Cloud and Linux security.

Feb 2024 - Present

Director, Security Research

Tel Aviv, Israel, IL

* Lead a research team focusing on hardware and software reverse engineering in the embedded Linux environment* Researched, discovered, and disclosed 5 high severity (CVSS score of 8 and up) vulnerabilities over the span of 6 months* Conducted cutting edge software and hardware reverse engineering security research projects* Spoke in multiple industry.

May 2022 - Oct 2023

Review Board Member

Tel Aviv, Israel, IL

Apr 2022 - Oct 2023

Director, Security Research — Enterprise Security Group

Cambridge, MA, US

Nov 2021 - May 2022

Area Vp Of Security Research, North America (Acquired By Akamai)

Tel Aviv, Tel Aviv, IL

** Guardicore is now a part of Akamai technologies, my role continues at Akamai under a different title.Conducting cutting edge research at Guardicore labs

Jan 2021 - Nov 2021

Vp, Security Strategy And Principal Security Researcher

San Diego, California, US

* Setting product strategy with regards to security research and security value* Advising senior management and helping to determine the company's strategy with regards to security research and security value* Conducting cutting edge security research and working with our product, research, and global security practice teams to make sure that our product.

Dec 2019 - Jan 2021

Sr Director, Head Of Security Research, Nocturnus Group

San Diego, California, US

Nocturnus is Cybereason's elite global security practice providing IR, malware analysis, monitoring, and other security research-related services to our customers. In my role as a founding member of the group, I am responsible for leading all of the security research related projects, including (but not limited to) advanced malware analysis and reverse.

Jun 2018 - Dec 2019

Principal Security Researcher

San Diego, California, US

Heading Cybereason's security research efforts in our Boston HQ. In my role as Principal security researcher, I'm reporting directly to our CTO and working with him on solving our security research related challenges.Among my responsibilities: Low level research (including kernel/usermode research), Reverse engineering of both threats and dark and hidden.

Aug 2016 - Jun 2018

Lead Linux And Mac Os X Security Researcher

San Diego, California, US

Leading Cybereason's security research on Apple's Mac OS X and Linux platforms. Mapping OSX/Linux attack vectors, writing OSX/Linux attack POCs, conducting low level OSX/Linux research, conducting OSX/Linux malware analysis and finding ways to gather low level OS metrics from usermode without implementing a driver or any kernel mode code.Achievements.

Nov 2015 - Aug 2016

Senior Security Researcher

San Diego, California, US

Responsible for finding creative ways to gather low level OS metrics and information while running from userland (without drivers or kernel mode code) in Windows, OSX and Linux, Researching malware and hacking techniques while working alongside with our software engineers to turn the research team's findings into detection capabilities in our.

Oct 2014 - Nov 2015

Review Board Member

Strongsville, OH, US

Apr 2018 - Aug 2019

Lead Embedded Systems Security Researcher

Jerusalem, IL

Leading the department's security research effort - Conducting POCs (firmware RE, Software RE, exploit development), designing architectures and training new developers/researchers.

2012 - Oct 2014

Senior Security Researcher

Jerusalem, IL

Leading dozens of security research projects from initial research level, exploit development to a working product.* Received a commendation from the director of the organization about a project I was involved in.

2010 - 2012 ~2 yrs

Network Research Specialist And Linux Internals Expert

Jerusalem, IL

Satellite communication project architect:Led a very high-budget project from the block diagram level to a full implementation. Managed developers, conducted PoCs and reverse engineering, developed a unique one-of-a-kind product.* Designing the system itself from the ground-up (servers, clients, custom built routers, Linux kernel modules, etc)* Designing.

2008 - 2010 ~2 yrs

Developer & Researcher

Israel Ministry Of Defense

R&D of miscellaneous Linux internals related projects

2006 - 2008 ~2 yrs

Founder And Administrator

Evilcheese - Webhosting

Evilcheese was my first project at the age of 15.Founded and managed solely by myself, It consisted of 3 webservers running Windows 2000, FreeBSD and Debian Linux. Evilcheese provided the cheapest webhosting packages in Israel back at the time.

Sep 2001 - May 2005
Team & coworkers

Colleagues at CrowdStrike

Other employees you can reach at crowdstrike.com. View company contacts →

2 education records

Amit S. education

Political Science And International Relations (Incomplete)

The Open University Of Israel

Certified Security Engineer

Technion - Israel Institute Of Technology
FAQ

Frequently asked questions about Amit S.

Quick answers generated from the profile data available on this page.

What company does Amit S. work for?

Amit S. works for CrowdStrike.

What is Amit S.'s role at CrowdStrike?

Amit S. is listed as Hardware and Software hacker, reverse engineer, Security research leader, public speaker at CrowdStrike.

What is Amit S.'s email address?

AeroLeads has found 2 work email signals at @cybereason.com for Amit S. at CrowdStrike.

Where is Amit S. based?

Amit S. is based in Boston, Massachusetts, United States while working with CrowdStrike.

What companies has Amit S. worked for?

Amit S. has worked for Crowdstrike, Sternum, Bsidestlv, Akamai Technologies, and Guardicore.

Who are Amit S.'s colleagues at CrowdStrike?

Amit S.'s colleagues at CrowdStrike include Nicole Torretta, Tyler Chang, Amos Gordon, Tommy Zraick, and Mike J..

How can I contact Amit S.?

You can use AeroLeads to view verified contact signals for Amit S. at CrowdStrike, including work email, phone, and LinkedIn data when available.

What schools did Amit S. attend?

Amit S. holds Political Science And International Relations (Incomplete) from The Open University Of Israel.

What skills is Amit S. known for?

Amit S. is listed with skills including Linux, Information Security, Network Security, Security, Networking, Penetration Testing, Tcp/Ip, and Python.

Find 750M verified contacts

Search by job title, company, industry, location, and seniority. Export verified B2B contact data when you need it.