Jeff Nathan

Jeff Nathan Email and Phone Number

Information Security @ Will disclose later
Chicago, IL, US
Jeff Nathan's Location
Greater Chicago Area, United States, United States
Jeff Nathan's Contact Details
About Jeff Nathan

An information security professional with a proven track record of innovation and problem solving across multiple domains who builds highly effective teams through leadership, mentoring and strong communication skills. Considerable depth and breadth of experience having worked in nearly every area of information security including vulnerability research, technology development, incident response, and operational security across the telecom, healthcare, finance, managed services, enterprise, and consumer security verticals. Uniquely experienced in software engineering combining experience in quality engineering, software development, product management, and innovation and prototyping. An expert in applied research and innovation bridging theory and practice across a litany of cybersecurity domains having bult and deployed more than a dozen products to millions of users.

Jeff Nathan's Current Company Details
Will disclose later

Will Disclose Later

View
Information Security
Chicago, IL, US
Jeff Nathan Work Experience Details
  • Will Disclose Later
    Information Security
    Will Disclose Later
    Chicago, Il, Us
  • Netography
    Director Of Detection Engineering
    Netography Sep 2023 - Present
    Annapolis, Md, Us
  • The Citizen Lab
    Research Fellow
    The Citizen Lab Mar 2023 - Present
  • The Honeynet Project
    Full Member / Board Of Directors
    The Honeynet Project Jul 2001 - Present
    Naperville, Il, Us
    The Honeynet Project is a 501(c)3 non-profit security research organization dedicated to investigating the latest attacks and developing open-source security tools to improve internet security.Board of Directors 2018-Present, Member 2001-Present
  • Independent Contractor/Consultant
    Principal
    Independent Contractor/Consultant Jul 2016 - Present
    Providing expertise and leadership in a variety of Information Security topics including research and development, prototyping and developing new products and services, vulnerability research, software development, threat hunting, penetration testing, reverse engineering, and alternative analysis. Select contracts:Mellanox (now NVIDIA)Co-developed a virtual machine introspection prototype that, after rapidly acquiring physical memory, made possible the detection of security events on virtualized operating systems without any software running on the virtual systems (written in C and Python), running on a programmable NIC (Patent 10802982). Bloomberg CIRTDeveloped a custom-built flow-based anomaly detection system (written in C and Python), applying statistical and data science methods for identifying hosts requiring further investigation – a project funded by Bloomberg’s CISO.
  • Nortonlifelock
    Director Of Threat Research, Norton Labs (Reporting To Cto)
    Nortonlifelock Nov 2020 - Dec 2022
    Tempe, Arizona, Us
    Accountable for global threat research and thought leadership efforts. Grew external researcher community interaction through collaboration with six additional companies and collaborated on threat hunting and combatting brand abuse, cryptocurrency, and other types of scams. Global SME for decision making and communicating with the public for Marketing, PR, and operational security teams.Represented the company to journalists, members of government, and industry analysts. Co-led work on mobile vaccine passports that informed millions of people worldwide of their shortcomings while simultaneously reverse engineering passports from Canada and proving they could be falsified.
  • Exabeam
    Principal Researcher
    Exabeam Oct 2018 - Nov 2020
    Foster City, California, Us
    Studied privileged insider cryptocurrency mining and authored a whitepaper on shadow mining. Researched multiple problem domains for expanding detection capabilities including Industrial Control Systems (ICS) and container and container orchestration attacks. Gathered customer data and authored measurement studies to identify and predict trends. Co-developed Zoom detection capabilities (in Python) as pandemic-driven remote work emerged. Co-developed an agnostic mechanism to identify attempts to extract windows credentials from memory and identify LSASS attacks. Built Exabeam’s automated detection lab for gathering various telemetry and developing new detection content.As technical lead of the research team mentored other researchers helping them approach research into electronic health records and financial systems. Also mentored many detection content developers and customer success team members through an informal program that led to authoring a formal detection triage program. As a thought leader helped shape the research roadmap, provided security expertise to Exabeam's data science, marketing, and PR teams and gave media interviews. Received the most valuable Exabeamer award for Q1 2020.
  • Symantec
    Principal Engineer, Detection - Security Intelligence Operations, Global Security
    Symantec Oct 2017 - Sep 2018
    San Jose, California, Us
    Integrated Phantom into Symantec’s Splunk environment by developing custom playbooks in Python. Developed automation tools to manage accounts for 200 internal AWS customers and supported peers to bring AWS security and network logs into Symantec’s Splunk infrastructure.
  • Vectra Networks, Inc.
    Security Research Engineer – Vectra Threat Labs
    Vectra Networks, Inc. Apr 2014 - Jul 2016
    San Jose, Ca, Us
    Subject matter expert for developing SMB and DCERPC detection capabilities in concert with platform engineering and data science teams – research further leveraged to develop ransomware detection ML models. Principal researcher and subject matter expert focused on improving outbound (D)DoS, outbound Spam, and DGA detection ML models and unique host identification heuristics. Gathered and analyzed data to develop Vectra’s 2014 Post Breach Industry Report and 2016 Post Intrusion Report in collaboration with the company’s marketing team. Co-led outbound efforts to assist customers in understanding and contextualize Vectra’s ML detections – work that directly led to Vectra closing its second largest deal in 2015.
  • Click Security
    Senior Security Engineer - Click Labs
    Click Security Mar 2013 - Apr 2014
    Austin, Texas, Us
    Following a reorganization to reengineer the entire product, co-created the APIs that enabled writing log-based detection content including asynchronous I/O, parsing, enriching log data, measuring performance and extensively documented them. Additionally, co-led the effort to productize the reimagined product including continuous integration, packaging, and operating system automation. Developed log-based detection content based on analyzing malware campaigns and attack tools.
  • Trustwave
    Product Manager
    Trustwave Jan 2012 - Jan 2013
    Chicago, Illinois, Us
    Business owner of Trustwave’s managed security services (MSS) defining product vision over 24 months enabling 148% growth over the previous 12 months.
  • Verizon Business
    Principal Engineer - Network Intelligence
    Verizon Business Jun 2008 - Jan 2012
    Basking Ridge, Nj, Us
    Developed threat hunting tools using C, Python, Java, Hadoop, and PostgreSQL operating on sampled network flow data with an ingestion rate exceeding 12 terabytes/day. Additionally, regularly briefed Verizon’s CISO and investigated significant security incidents.
  • Arbor Networks
    Senior Security Engineer/Software Engineer
    Arbor Networks Sep 2003 - May 2008
    Burlington, Ma, Us
    Originally accountable for software testing of Arbor's Peakflow X platform and building testing tools, went on to found Arbor’s Security Engineering and Response Team (ASERT) and co-create Arbor’s threat intelligence service (ATLAS). Additionally, developed dozens of behavioral security policies, trained key customers to defend against burgeoning threats, and honed a growing software engineering skillset in writing kernel and user space code.
  • Sygate Technologies (Acquired By Symantec)
    Senior Software Engineer
    Sygate Technologies (Acquired By Symantec) Jan 2003 - Sep 2003
    Us
    Developed network-based detection capabilities based on vulnerability research.
  • Independent Contractor
    Consultant
    Independent Contractor May 2002 - Jan 2003
    Worked with startups, primarily Sourcefire, as a software developer and technical expert during due diligence meetings with key SF Bay Area customers.
  • Mckesson Corporation
    Senior Security Consultant - (Office Of The Chief Privacy Executive)
    Mckesson Corporation Sep 2001 - May 2002
    Irving, Texas, Us
    Investigated security incidents as the final escalation point, developed enterprise-wide intrusion detection and log-based detection capabilities, and evaluated third-party security products.
  • @Stake (Acquired By Symantec)
    Senior Security Architect
    @Stake (Acquired By Symantec) Oct 2000 - Sep 2001
    Consulted on pen tests and vulnerability assessments and developed internal tools. Additionally, one of a select group of consultants who led long-term customer funded research projects; co-discovered the vulnerability in CVE-2001-0895.
  • Hiverworld (Acquired By Tripwire)
    Senior Research Engineer
    Hiverworld (Acquired By Tripwire) Jan 2000 - Sep 2000
    Developed vulnerability scanner and intrusion detection signatures and developed the company’s hardware platform and operating system customization.
  • Teksystems
    Contract System Administrator
    Teksystems May 1998 - Dec 1999
    Hanover, Md, Us
    As a contractor to Motorola, Inc.: accountable for developing tools to automate patching dozens of commercial Unix systems running AIX, Solaris, and HP-UX in preparation for Y2K using Perl and ExpectAs a contractor to Encyclopedia Britannica managed commercial Unix systems and helped replaced aging infrastructure.
  • Arizona State University, Systems & Network Management
    Computer Programming Specialist
    Arizona State University, Systems & Network Management Aug 1997 - Dec 1999
    Tempe, Az, Us
    Developed a web front-end for Arizona State's problem management and change control systems built upon Remedy and Sybase (Perl, C and shell scripts).
  • Open Port Technology, Inc.
    System Administrator
    Open Port Technology, Inc. Dec 1995 - Aug 1997
    Managed commercial Unix systems
  • Open Port Technology, Inc.
    Quality Assurance Analyst
    Open Port Technology, Inc. Jul 1995 - Dec 1995
    Accountable for software testing.

Jeff Nathan Skills

Public Speaking Software Engineering Software Development Reverse Engineering Distributed Systems Big Data Computer Forensics Network Security Network Forensics Computer Security Security Research Firewalls Ids Information Security Amazon S3 Intrusion Detection Security Cloud Computing Internet Security Security Architecture Design Kernel Programming System Administration Systems Programming Data Security Malware Analysis Application Security Network Architecture Penetration Testing

Frequently Asked Questions about Jeff Nathan

What company does Jeff Nathan work for?

Jeff Nathan works for Will Disclose Later

What is Jeff Nathan's role at the current company?

Jeff Nathan's current role is Information Security.

What is Jeff Nathan's email address?

Jeff Nathan's email address is je****@****ock.com

What skills is Jeff Nathan known for?

Jeff Nathan has skills like Public Speaking, Software Engineering, Software Development, Reverse Engineering, Distributed Systems, Big Data, Computer Forensics, Network Security, Network Forensics, Computer Security, Security Research, Firewalls.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.