David Pearson

David Pearson Email and Phone Number

Director, Detection and Response Engineering @ Expel
Rochester, NY, US
David Pearson's Location
Rochester, New York Metropolitan Area, United States, United States
David Pearson's Contact Details
About David Pearson

I love to solve problems, especially those written off as impossible by others. I am at my best when given the opportunity to think of novel solutions, to experiment with new techniques, and to brainstorm about connections within information that others would overlook. My expertise is in network analysis, and I find great joy in leveraging the information it provides to create the foundation for my research efforts.

David Pearson's Current Company Details
Expel

Expel

View
Director, Detection and Response Engineering
Rochester, NY, US
David Pearson Work Experience Details
  • Expel
    Director, Detection And Response Engineering
    Expel
    Rochester, Ny, Us
  • Arcanna.Ai
    Chief Product Officer
    Arcanna.Ai Sep 2024 - Present
    New York, Us
  • Bayse Intelligence
    Founder And Ceo
    Bayse Intelligence Sep 2022 - Sep 2024
    As a solo entrepreneur, I've designed, architected, and built all aspects of the phishing and fraud sandbox that ingests millions of URLs and fully analyzes, classifies (malicious, suspicious, benign), and explains verdicts for hundreds of thousands of the most interesting links daily. The detection logic contains dozens of signals from all aspects of each site, including likelihood of brand/topic impersonation, brand or vertical targeted, newness and popularity of domain, and confidence in the verdict. My creation of Site Fingerprints (which links together related attacks and offers 0-hour, sub-second detection of phishing kits/templates) is one of many reasons why Bayse has been chosen as a partner by multiple Threat Intelligence Platforms and serves both brands and the threat intelligence community directly. The investigation UI enables pivoting and searching through detailed data points that are stored in a highly-performant relational database cluster. Learn more at https://bayse.io.
  • Seclarityio
    Co-Founder And Ceo
    Seclarityio Mar 2021 - Aug 2022
    I co-created a SaaS platform for security analysts, threat research groups, and threat intelligence practitioners to quickly and easily understand, annotate, and share network-based telemetry (unifying analysis of PCAP, Zeek, NetFlow, and VPC Flow Logs).
  • Awake Security
    Head Of Threat Research
    Awake Security Apr 2016 - Mar 2021
    Santa Clara, California, Us
    I joined Awake as the first Threat Researcher and (over the course of 5 years) grew and led theremote-first, international Threat Research team to a size of 10 people. During my tenure, I was responsible for creating or guiding the development of many algorithms core to Awake’s IP, building out the query language, building out much of the early detection logic (Detection Engineering), starting and running the Threat Hunting function, and acting as the security adviser for many aspects of the company(including leading all security aspects of interaction with the Data Science team). Moreover, I was instrumental in co-creating the automated detection and response functionality of the platform (associated with one of several patents I received for my work at Awake). In addition to my individual contributor work, my management duties included hiring, career development, resource management, and executive strategy. I also spent considerable time working closely with the Sales organization, working directly with customers, and speaking about my threat research discoveries at security conferences.
  • Rochester Institute Of Technology
    Adjunct Professor
    Rochester Institute Of Technology Aug 2017 - Dec 2017
    Rochester, Ny, Us
    I am a member of the adjunct faculty for the foundational course in information security at RIT. This course is taught to all incoming Information Security BS students, and is the building block for all following advanced courses.
  • Awake Networks
    Threat Researcher
    Awake Networks Dec 2015 - Apr 2016
    I strive to solve problems using methods that have either been overlooked, under-analyzed, or never considered in the field of network security. Most days feel like I'm working to solve an extremely complicated puzzle, which is exactly the kind of work I love to do!
  • Sandia National Laboratories
    Member Of Technical Staff
    Sandia National Laboratories Jun 2011 - Dec 2015
    Albuquerque, Nm, Us
    I performed information security/network research and development across a variety of disciplines.
  • Sandia National Laboratories
    Telecommuting Intern
    Sandia National Laboratories Aug 2010 - May 2011
    Albuquerque, Nm, Us
    Continuation of my research with SNL.
  • Sandia National Laboratories
    Center For Cyber Defenders Intern
    Sandia National Laboratories May 2010 - Aug 2010
    Albuquerque, Nm, Us
    I worked in various research areas, with a focus on malware analysis and detection.
  • Rochester Institute Of Technology
    Researcher
    Rochester Institute Of Technology Mar 2010 - May 2010
    Rochester, Ny, Us
    In this Research Assistantship position, I modeled attacks on WSNs, particularly using the TI MSP430 remote sensor line. I will be presenting my research at the 2010 International Conference on Security and Management, in the Cybersecurity education track.

David Pearson Skills

Computer Security Computer Forensics Networking Network Security Python Reverse Engineering Malware Analysis Network Forensics System Administration Wireless Security Web Application Security Penetration Testing Vulnerability Assessment Cryptography Linux Security Arm C Intel Assembly Familiarity With Critical Infrastructure Vmware Esx

David Pearson Education Details

  • Carnegie Mellon University
    Carnegie Mellon University
    Information Security Technology And Management
  • Rochester Institute Of Technology
    Rochester Institute Of Technology
    Information Security & Forensics

Frequently Asked Questions about David Pearson

What company does David Pearson work for?

David Pearson works for Expel

What is David Pearson's role at the current company?

David Pearson's current role is Director, Detection and Response Engineering.

What is David Pearson's email address?

David Pearson's email address is da****@****ail.com

What is David Pearson's direct phone number?

David Pearson's direct phone number is +157087*****

What schools did David Pearson attend?

David Pearson attended Carnegie Mellon University, Rochester Institute Of Technology.

What are some of David Pearson's interests?

David Pearson has interest in Weight Lifting, Health, Children, Spending Time With Family, Reverse Engineering, Education, Environment, Outdoor Recreation, Science And Technology, Human Rights.

What skills is David Pearson known for?

David Pearson has skills like Computer Security, Computer Forensics, Networking, Network Security, Python, Reverse Engineering, Malware Analysis, Network Forensics, System Administration, Wireless Security, Web Application Security, Penetration Testing.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.