Derek Abdine

Derek Abdine Email and Phone Number

Co-Founder, CEO @ furl - Autonomous remediation at scale | Inventor | Cybersecurity Researcher @ furl
Derek Abdine's Location
Los Angeles Metropolitan Area, United States, United States
About Derek Abdine

Want a demo of furl? Click "Book an appointment" under my profile, or use this link:https://meetings.hubspot.com/derek-abdine/demo

Derek Abdine's Current Company Details
furl

Furl

View
Co-Founder, CEO @ furl - Autonomous remediation at scale | Inventor | Cybersecurity Researcher
Derek Abdine Work Experience Details
  • Furl
    Co-Founder, Ceo
    Furl May 2022 - Present
    Los Angeles, Ca, Us
    Autonomous cybersecurity remediation at scale.
  • Self-Employed
    Freelance Security Research
    Self-Employed Jan 1999 - Present
    Provide discovery and support services for security issues in hardware and software. Coordinate on responsible disclosure, organize findings with CISA and impacted parties.Part-time, on and off "report it when I see it."Have privately and publicly published discoveries for Arris, AT&T, Tesla, Expedia, and others.
  • Censys
    Chief Technology Officer
    Censys Aug 2020 - Nov 2021
    Ann Arbor, Michigan, Us
    Led product strategy, vision, security research and engineering execution. Created an emergent response program to inform customers of critical new security issues and threats. Rebuilt engineering process to increase velocity and spun up nearshore contractors to boost time to market on new features. Our security research was featured in Gizmodo, Engadget, Ars Technica, Forbes and other publications.Backed by Google Ventures & Decibel.
  • Cyber Threat Alliance
    Steering Committee Member
    Cyber Threat Alliance Jun 2018 - Aug 2020
    Arlington, Va, Us
  • Rapid7
    Senior Director, Labs, Office Of The Cto
    Rapid7 Jan 2018 - Aug 2020
    Boston, Massachusetts, Us
    Head of Labs, leading data science (AI/ML), threat intelligence, security research and engineering within the office of the CTO. Oversaw/led efforts for internet scanning (Sonar), massive DNS (forward/reverse) collection, global honeypotting (Heisenberg) and attack surface management capabilities.Worked with the White House Council of Economic Advisors (CEA) on long-term impact of cybersecurity on the US economy. Our group's research was included in the 2019 Economic Report to the President.Represented Rapid7 in the Cyber Threat Alliance.
  • Rapid7
    Director, Labs, Office Of The Cto
    Rapid7 Nov 2015 - Jan 2018
    Boston, Massachusetts, Us
    Global computer security telemetry collection from both passive (Project Heisenberg) and active (Project Sonar) data collection efforts. Led the creation, maintenance and deployment of data pipelines to process trillions of security records per month. Read more about our work at https://opendata.rapid7.com and https://www.rapid7.com/about/research.
  • Rapid7
    Principal Architect, Office Of The Cto
    Rapid7 Oct 2011 - Nov 2015
    Boston, Massachusetts, Us
    Portfolio-wide technical leadership across multiple time zones. Specialize in on and off-premise (cloud/hosted) scalable application design/architecture, data collection, prototyping & security research.Built a framework to test LISP-based rules for Jess, a Java-based RETE (good old fashioned AI) built by Sandia National Labs. Jess was used in the backend of our vulnerability management product. The goal was to enable engineers improve overall development speed and scanning quality while reducing customer-reported defects.Built a cloud-native proof of concept vulnerability management SaaS platform utilizing existing components from our on-premises product.
  • Rapid7
    Senior Manager, Security Engineering
    Rapid7 Oct 2009 - Oct 2011
    Boston, Massachusetts, Us
    * Built and led multiple teams that covered security research, signature creation automation and scan platform development.* Increased the number of vulnerability checks by 100% over a two-year time period compared to the previous six years (from 12,000 to 24,000).* Created a successful Payment Card Industry (PCI) support program and process to improve product accuracy which resulted in improved sales into the PCI space as well as increased customer satisfaction.* Created and negotiated quarterly and yearly roadmaps. * Developed data science toolkit and processes to derive roadmap priorities for vulnerability check coverage by ingesting several hundred gigabytes of anonymized opt-in data for discovery of popular software.* Implemented customer-facing SLAs ranging from 24 hours to 2 weeks, backed by internal processes and systems.* Developed marketing and sales competitive positioning for vulnerability content w.r.t. other vendors.
  • Rapid7
    Manager, Release Engineering
    Rapid7 Mar 2010 - Jul 2011
    Boston, Massachusetts, Us
    Built a responsive engineering services organization capable of meeting the demands of a hyper-growth early stage startup.
  • Rapid7
    Manager, It
    Rapid7 Mar 2010 - Oct 2010
    Boston, Massachusetts, Us
    Led a geographically distributed team to enhance our infrastructure and internal service processes.* Established an off-shore VMware virtualization stack by coordinating local (US) and remote (Bangalore, India) teams from procurement through deployment.* Established a responsive repeatable helpdesk process involving transitioning an existing SaaS-based ticketing system to an on-premise solution.* Implemented agile/scrum for IT projects and a collaborative process that included stakeholders from multiple organizational units to improve service visibility and aide in quarterly and yearly IT project planning.* Led a team to deliver a private cloud infrastructure to allow cost-effective scaling of Engineering hardware needs that meet the growth demands of a rapidly expanding startup.
  • Rapid7
    Manager, Engineering
    Rapid7 Jan 2009 - Oct 2009
    Boston, Massachusetts, Us
    Managed core product teams to deliver compelling new features in our flagship product.* Participated in release planning and estimation discussions for major releases.* Developed sustaining processes to improve response on customer-reported product issues.* Built and hired into new teams to develop more product features.* Wrote specifications and led teams to improve the web spider (crawler) component of a vulnerability management product, which included authenticating against web-based forms.* Enabled a formal entry into the energy sector by developing product features to scan sensitive SCADA devices, working with marketing on external NERC CIP mapping materials, on-boarding sales and support.* Developed processes and tools to address customer issues.
  • Rapid7
    Principal Engineer, Nexpose
    Rapid7 Mar 2008 - Jan 2009
    Boston, Massachusetts, Us
    Designed and implemented a software licensing platform integrated into a CRM with a SOAP-based API (a la NetSuite) for third-party OEM partners to self service license creation. Personally trained both Sales and Support for smooth company-wide adoption.Drastically improved design of our flagship product to reap massive performance benefits while collecting Windows registry telemetry from devices on a network using an in-product caching mechanism (up to 80% in measured cases).Worked closely with a large energy customer--including an on-site visit with on the fly engineering customizations at a highly secured power plant in Southern California--that led to a formalized entry into the ICS/SCADA security market.
  • Rapid7
    Security Researcher
    Rapid7 Nov 2005 - Mar 2008
    Boston, Massachusetts, Us
    I upheld the strength in our risk assessment and remediation capabilities by developing vulnerability checks and creating the necessary scanning back-end code to support those checks. As a by-product of that work, I released several advisories:CVE-2006-5379 - NVidia binary blob buffer overflowCVE-2007-2439 - Caucho Resin DOS device denial of serviceCVE-2007-2440 - Caucho Resin directory traversalCVE-2007-2441 - Caucho Resin system path disclosureCVE-2007-2437 - Xrender extension denial of serviceCVE-2008-1368 - Internet Explorer FTP command injection (disputed as a duplicate of an already patched vulnerability)Main achievements:* Ground-up development of numerous network protocols in Java including RFB, SSH, FTP, TDS (Oracle), CIFS and others. Proprietary protocols requiring reverse engineering from network packet inspection. These were used to probe network services and extract telemetry from LAN assets.* Enhanced metadata collection mechanisms around Windows Portable Executable (PE) and 16-bit New Executable (NE) file formats.* Redesigned an internal XML-based DSL used to describe formats for data collection and assessment (such as boolean logic operations and new test types) over an input data set.* Maintenance and extension of an expert system based attack simulation platform that had a significant foundation in LISP.* Support fast, precise discovery of missing patches from Microsoft by writing and absorbing data from Microsoft's WSUS database into Rapid7 products. In the news:http://www.pcworld.com/article/143344/ftp_bug_leaves_ie_users_vulnerable.htmlhttp://slashdot.org/story/06/10/16/2038253/root-exploit-for-nvidia-closed-source-linux-driver
  • Soldthru
    Co-Founder & Cto
    Soldthru Mar 2013 - Nov 2013
    Boost conversions with price optimization for e-commerce. Something new and not security related to challenge myself ¯\_(ツ)_/¯
  • None
    Projects
    None 1998 - 2007
    Co-creator of MultiTheftAuto (2003-2007) [www.mtavc.com] - A first-of-its-kind open source platform that utilized malicious software runtime code patching techniques in a non-malicious way to extend the value of Rockstar North's Grand theft auto by adding multiplayer support (as well as new visual elements). Reverse engineered GTA3, Vice City and San Andreas to inject new code and draw entirely new scenes, entities, and sounds within the game's 3D environment. Introduced a scripting platform for community modifications. Loved by hundreds of thousands of unique players per month to this day. We open-sourced it and gave it away for free.osdir interview: http://osdir.com/Article4775.phtmlModDB mod of the year 2010 award (4th place): http://bit.ly/gEeVQHG4/TechTV Segment: http://www.youtube.com/watch?v=zQHK8h2XAg0~~Game-Security (2004) - Stifle cheating in online multiplayer video games. An alternative to punkbuster and VAC (valve anti-cheat) that could keep up with common threats.~~Research - Creator of small, undetectable proof-of-concept cheats for popular online games. One such cheat was written entirely in assembly and provided full wall transparency within counter-strike while being undetectable by popular anti-cheat systems. This concept was made to prove anti-cheat bypass, and eventually led to game-seucrity.com. Security research & development. Smart card hacking.~~NewNet IRC (1999-2001) - IRC operator for newnet, a fledging network in the early 2000's. I was 16 years old at the time. Also an operator for IRC storm. IRC was the primary means of online communication before the prevalence of social networks and major forums.
  • Csulb Parking & Transportation Services
    It System Analyst
    Csulb Parking & Transportation Services Nov 2004 - Nov 2005
    Responsible for maintaining a network of services for supporting automated ticketing systems, online web applications for integrators into ticketing systems, general desktop support, processing citations that go to the DMV, and maintenance of a server farm.* Automated the upload of vehicle citation information with a legacy application where no vendor support was available. This was achieved by reverse engineering the software, hooking into the Windows event loop, capturing message box and dialog events and simulating button presses. This improved business performance by removing the need for a person to manually upload the information by pressing a series of buttons in the software (at 6:45am! Hint: yes, it was me who would press the buttons so I automated that job away).* Created a development organization within the IT department. Recruited the first developer.* Rolled out new parking ticket kiosks around the campus with the help of other staff. Responsible for managing the network connectivity of these kiosks.* Provided desktop support to over 50 users using a rudimentary ticketing process.* Migrated hardware from one collocation to another.* Created a Windows CE application for handheld embedded devices called "lot survey" which allowed staff to understand open parking spaces on the campus. This data was uploaded, plotted and analyzed by the exec team to understand where and when new parking would be needed. It replaced a paper version.* Responsible for maintaining servers (including backup, configuration, etc.).* Security patching of servers and employee workstations.
  • Freelance
    Dish Installer
    Freelance Jan 1998 - Jan 2001
    Consulted with customers and installed satellite television gear. Handled install, calibration and activation."Company" I created as a teenager.
  • Gmed
    Software Engineering Intern
    Gmed Jul 1999 - Aug 1999
    Summer internship at age 16. Worked on converting vbscript scriptlets to javascript (over 100 such conversions over 2 months).

Derek Abdine Skills

Security Computer Security Java Linux Cloud Computing Web Application Security Vulnerability Assessment Agile Methodologies Android Problem Solving Data Security Vulnerability Management Reverse Engineering Javascript Situational Leadership Enterprise Software Distributed Systems Jess Software Development Postgresql Saas Software As A Service Amazon Web Services Message Oriented Middleware Heroku Data Analysis Soa Private Cloud Ruby Osgi

Derek Abdine Education Details

  • California State University, Long Beach
    California State University, Long Beach
    Minor Computer Science

Frequently Asked Questions about Derek Abdine

What company does Derek Abdine work for?

Derek Abdine works for Furl

What is Derek Abdine's role at the current company?

Derek Abdine's current role is Co-Founder, CEO @ furl - Autonomous remediation at scale | Inventor | Cybersecurity Researcher.

What is Derek Abdine's email address?

Derek Abdine's email address is de****@****ail.com

What is Derek Abdine's direct phone number?

Derek Abdine's direct phone number is +162634*****

What schools did Derek Abdine attend?

Derek Abdine attended California State University, Long Beach.

What are some of Derek Abdine's interests?

Derek Abdine has interest in Building Awesome Things.

What skills is Derek Abdine known for?

Derek Abdine has skills like Security, Computer Security, Java, Linux, Cloud Computing, Web Application Security, Vulnerability Assessment, Agile Methodologies, Android, Problem Solving, Data Security, Vulnerability Management.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.