Carter Jones Email and Phone Number
Carter Jones work email
- Valid
- Valid
- Valid
- Valid
- Valid
Carter Jones personal email
- Valid
Carter Jones phone numbers
https://resume.carterjones.info/Recruiters: I'm happy at Palo Alto Networks and am not considering new opportunities at this time.I'm a security generalist with 15 years of experience in the security industry as a product security researcher and engineer, DevOps practitioner, developer (infrastructure engineering/application security), and consultant. I communicate fluently with both computers and humans.My prominent employers and clients include security product firms, healthcare-related organizations, financial institutions, and defense-related organizations.I have a passion for automating things, making systems more robust, and making your pain points go away. I have an insatiable desire to learn and bend technologies to my will. I will enable your organization to increase its throughput, enabling you to provide ever-increasing delight to your clients.---Technologies:- GCP: VPC, IAM, CloudRun- AWS: IAM, EC2, S3, ECS (Fargate), RDS, Config, CloudFormation, Route53, DirectConnect, VPN, NAT, VPC- Languages: Go, Python, Bash, Terraform, C#, C, C++, HTML, JavaScript, Java- Infrastructure Engineering: GitHub Actions, CircleCI, Jenkins, Docker, Packer, Vault, Chef- Security engineering tools: Bandit, Prowler, s3tk, CS Suite, Duo Beyond, Duo Access Gateway- Defensive security tools: tCell, Immunio, Komand- Offensive security tools: OWASP ZAP, Burp Suite, Nessus, Retina, Metasploit, Core Impact, IDA Pro, DarunGrim, ILSpyCertifications: CASP+, Security+Concepts: DevOps, Infrastructure as Code, Infrastructure Security, Application Security, Security Automation, Continuous Integration, Configuration as Code, Secure Code Review
Palo Alto Networks
View- Website:
- paloaltonetworks.com
- Employees:
- 17854
-
Palo Alto NetworksUnited States -
Senior Manager, Vulnerability Discovery And DisclosuresPalo Alto Networks Nov 2024 - PresentSanta Clara, California, Us- Published and managed high profile advisories on the Palo Alto Networks Security Advisory website. -
Manager, Vulnerability Discovery And DisclosuresPalo Alto Networks Feb 2024 - Nov 2024Santa Clara, California, Us- Performed deep dive analysis of numerous product vulnerability reports, identified root causes (both functionally and specific lines of code), guided product engineering to ultimate solutions, and verified the efficacy of fixes.- Facilitated the resolution of customer security concerns by working directly with customers, product management, and engineers. Provided clear guidelines to the product team to ensure remediations were effective and complete.- Drove visibility of SLA misses for remediation efforts by creating simple and effective self-service portals for multiple audiences (product management, InfoSec management, technical product management).- Published and managed numerous high profile advisories on the Palo Alto Networks Security Advisory website.- Onboarded, mentored, and managed a team of product vulnerability researchers who performed the core responsibilities of PSIRT. Drove career growth through frequent 1:1s and collaboration sessions, followed by more formal performance reviews on a 6-month basis. -
Senior Staff Product Security ResearcherPalo Alto Networks May 2022 - Feb 2024Santa Clara, California, Us- Performed deep dive analysis of numerous product vulnerability reports, identified root causes (both functionally and specific lines of code), guided product engineering to ultimate solutions, and verified the efficacy of fixes.- Developed proof of concept exploits to demonstrate the specific mechanisms of vulnerabilities to the product teams, which could be used to demonstrate the severity and practicality of vulnerabilities, as well as verify the efficacy of fixes.- Lead the remediation process for numerous Palo Alto Networks product vulnerability reports, from initial report triage, to collaborating with the engineering team to provide guidance and assist with reproduction when needed, and ultimately publishing advisories on https://security.paloaltonetworks.com.- Ensured clear communication, set expectations, and facilitated information flow with reporters (customers, researchers, partners, etc.) by serving as the face of InfoSec over written communications.- Reenforced team resilience by documenting numerous procedures only shared through tribal knowledge.- Established robust automations and infrastructure as code by migrating multiple hand-crafted systems used to support the team’s efforts to systems automatically built by Docker and Packer, that were entirely deployed via Terraform.- Significantly improved the team’s efficiency by refining our existing tooling, so we could apply our focus toward technical analysis, rather than spending time on automatable tasks. -
Senior Infrastructure EngineerTruss Oct 2020 - May 2022San Francisco, Ca, Us- Lead the design and implementation of positioning an application, running within AWS, behind NIPRNet, a secure DoD-managed network.- Lead the technical evaluation of a system's adherence to PostgreSQL STIG requirements.- Re-architected PostgreSQL connections within AWS to follow the principle of least privileges; modified unit tests to verify the new architecture design.- Reduced technical debt and overall system complexity by combining Terraform modules.- Mentored team members on infrastructure security via pair programming. -
Staff Security EngineerNuna Inc. Apr 2018 - Oct 2020San Francisco, California, Us- Improved the foundational security of multiple AWS accounts, complex systems, and cross-functional team processes as well as improved the maintainability and scalability of the infrastructure of multiple government projects by leveraging the client's strong focus on achieving adherence to a compliance standard (ARS 3.1).- Developed cross-functional alignment through transparent and clear communication in multiple high-impact commercial and government projects.- Influenced key stakeholders to prioritize making risk-based decisions based on practical business and technical risks rather than focusing on strict adherence to compliance checklists, while still meeting mandatory compliance standards.- Crystallized and amplified the highest impact goals of key stakeholders within multiple cross-functional teams.- Decreased maintenance overhead shared by multiple teams as both a voice of influence and as an individual contributor by prioritizing highly impactful tech debt removal efforts, inspiring members of the organization to target similar tech debt reduction opportunities.- Lead multiple complex software upgrades by way of fast iterative improvements, favoring small change sets to remove tech debt, decouple tightly coupled code bases, and decrease the maintenance burdens and risks for future engineers.- Enabled a 50% reduction in build and deployment time by prototyping loosely coupled, functionally-architected Jenkins pipelines that could replace highly fragile tightly coupled Jenkins freestyle jobs.- Championed the DevOps concepts of continuous improvement on a daily basis in both a cross-functional team leadership capacity and as an individual contributor.- Increased visibility into security deficiencies in multiple projects by implementing open source utilities into CI pipelines, utilizing internal tooling that controlled COTS vulnerability scanners, as well as created custom tooling where open source and COTS solutions were unavailable. -
Senior Security EngineerNuna Inc. Aug 2016 - Mar 2018San Francisco, California, Us- Worked shoulder to shoulder with other employees through constant pairing, mentoring, and knowledge sharing about principles and best practices in security and infrastructure.- Was the security engineering subject matter expert on a team that made a group of legacy systems HIPAA compliant.- Created internal tooling to simplify use of Hashicorp Vault, such as internal TLS certificate management tooling.- Improved scalability of operations teams by leading an effort to migrate from manual user/group management of a COTS piece of software (Looker) to instead be backed by Active Directory groups.- Provided security engineering reviews of new technologies being considered by application teams.- Managed multiple 3rd party penetration tests of Nuna's infrastructure, followed all the way through to remediation of vulnerabilities. Managed relationships with multiple 3rd security product vendors.- Improved scalability of Nuna's corporate security team by leading the effort to roll out an internally managed endpoint trust management system, as well as an integrated single sign on system.- Designed and implemented a continuous integration deployment architecture for a highly available security ChatOps COTS application.- Lead the Security team in architecting and implementing a redeployable Nessus setup that scanned Nuna's entire commercial AWS infrastructure. -
Senior Security ConsultantCigital, Inc Oct 2015 - Aug 2016Dulles, Va, Us- Designed/implemented a hardened Active Directory deployment within AWS.- Built an automated blue/green server deployment infrastructure.- Provided technical review and oversight for both internal and client-facing projects.- Expanded the scalable value that could be delivered to future clients by Cigital by contributing to emerging internal security consulting practices. -
Security ConsultantCigital, Inc Jun 2014 - Oct 2015Dulles, Va, Us- Increased scalability of consultants by automating internal processes with custom tooling.- Contributed to increased sales by scoping projects and providing technical insight as part of sales pipelines.- Improved the security posture of clients by conducting security assessments (red team, thick client, web app, network, source code review, and information security analysis reviews) and delivering detailed reports including findings, evidence, risk analysis, and remediation recommendations. -
Security Research EngineerBeyondtrust Jun 2011 - May 2014Johns Creek, Georgia, Us- Delivered executive analysis of over 100 Microsoft security patches to customers through the use of a combination of write-ups from the Microsoft MAPP program, as well as through the use of reverse engineering tools.- Co-lead over 30 monthly webinars discussing Microsoft security bulletins and recent security news.- Delivered exploit and vulnerability details to our customers for 15-20 exploit toolkits on an ongoing basis. Details were sent via paid product data streams.- Designed and implemented an exploit metadata importing utility that pulled from Metasploit and supplied the data via our proprietary vulnerability scanner.- Performed internal and external network penetration tests. -
Research InternEeye Digital Security Feb 2010 - Jun 2011Irvine, Ca, Us- Analyzed 5-10 Microsoft security bulletins monthly, providing practical mitigation strategies to clients in the form of executive reports. -
Security InternCanon Development Americas, Inc. 2009 - 2010- Wrote a proof of concept to trigger a vulnerability in a Java application embedded in printers, documented analysis techniques, and presented reports internally.
-
Head TechnicianBlakeley & Blakeley Llp Jan 2008 - Dec 2008Irvine, California, Us- Created an internal web application used for case law management, using PHP/MySQL.- Provided technical support to office staff.- Maintained office software, networks, and shared file servers.
Carter Jones Skills
Carter Jones Education Details
-
Uc IrvineComputer Science
Frequently Asked Questions about Carter Jones
What company does Carter Jones work for?
Carter Jones works for Palo Alto Networks
What is Carter Jones's role at the current company?
Carter Jones's current role is Senior Manager, Vulnerability Discovery and Disclosures at Palo Alto Networks.
What is Carter Jones's email address?
Carter Jones's email address is ca****@****una.com
What is Carter Jones's direct phone number?
Carter Jones's direct phone number is +170340*****
What schools did Carter Jones attend?
Carter Jones attended Uc Irvine.
What skills is Carter Jones known for?
Carter Jones has skills like Software Engineering, Computer Security, Amazon Web Services, Penetration Testing, Reverse Engineering, Network Security, Windows Security, Linux, Python, C#, C++, Security Research.
Who are Carter Jones's colleagues?
Carter Jones's colleagues are Josephine Yu, Prashanth Chittapuram, Avi Baruch, Reed Follensbee, Yun Peng, Renu Menon, Hyndavi K E.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial