Joey Perme work email
- Valid
- Valid
- Valid
Joey Perme personal email
- Valid
- Valid
Seasoned Security Engineer and Researcher with experience in a variety of areas. My specialty is cyber-physical security, having worked on a number of devices including autonomous vehicles, cameras, WiFi extenders, and point-of-sale systems, among others. Also experienced in traditional penetration tests, vulnerability research, reverse engineering, and previously software engineering.I'm happy when I can take something apart, happier when I can figure out how it works, and happiest when I can cause it to elicit novel behavior.
-
Senior Security Consultant (Hardware/Embedded Penetration Tester)Netspi Oct 2024 - PresentMinneapolis, Minnesota, Us• Conduct thorough penetration testing on hardware and embedded systems, including IoT devices, automotive systems, industrial control systems (ICS), and other critical infrastructure.• Identify, analyze, and document security vulnerabilities and exploits in hardware and firmware.• Provide detailed reports and presentations to stakeholders, outlining findings and remediation strategies.• Mentor junior team members and contribute to the development of best practices and testing standards. -
Founder & PrincipalLakefront Strategy Llc Aug 2024 - Present -
Security EngineerMicrosoft Apr 2024 - Oct 2024Redmond, Washington, Us -
Vulnerability ResearcherBitsight Nov 2023 - Apr 2024Boston, Massachusetts, Us• Perform technical research on latest n-day vulnerabilities.• Develop capabilities for core business product to test vulnerability status of worldwide devices.• Author scripts and software changes to improve research team’s productivity. -
Security Engineer, Offensive Security Penetration TestingAmazon Aug 2023 - Nov 2023Seattle, Wa, Us• Proactively penetration test primarily web applications serving both internal (~1.5m) and external (global) customers. • Domains include developer and internal tooling, authN/authZ mechanisms, and public-servicing web applications. -
Security Engineer, Software Reverse Engineering And Exploit DevelopmentNuro Dec 2021 - May 2023Mountain View, Ca, Us• Ensured high security and safety bar prior to major company deployments and milestones.• Reverse engineered hardware and software using IDA, Ghidra, Jadx, and other tools to develop implementations for novel exploit concepts.• Performed both black and white box penetration tests on hardware, software, and infrastructure.• Provided and drove expert remediation working with cross-team and cross-org stakeholders. -
Security EngineerAmazon Web Services (Aws) Jun 2021 - Nov 2021Seattle, Wa, Us• Reviewing design and architecture ensuring high security bar for new AWS features and services.• Threat modeling new features of internal and external-facing AWS services.• Working with service teams to mitigate and learn from potential threats.• Participating in on-call rotations for security reviews. -
Security EngineerAlarm.Com Jul 2020 - May 2021Tysons, Virginia, Us• Protecting Alarm.com external customers and internal infrastructure by discovering vulnerabilities, driving their remediation, and offering security guidance. • Authoring software to automate stages of the penetration testing and reverse engineering lifecycle increasing pentest throughput.• Researching and authoring whitepaper(s) on long-term technical capabilities to knowledge-share with and add to the team. • Performing chip-off, firmware dumping, custom file unpacking, and binary reverse engineering to support pentesting of proprietary software and protocols. • Operating devices under test on an instrumented network to understand device behavior and possible vulnerabilities. • Summarizing findings in proof-of-concepts and formal write-ups, and presenting to management stakeholders. • Participating in on-call rotations and incident response as on-call security point-of-contact. -
Associate Security ResearcherCert Division At The Software Engineering Institute Jan 2020 - Jun 2020Pittsburgh, Pennsylvania, Us• Reverse engineered mobile and embedded devices and software to analyze functionality and security implications. • Researched the functionality of emerging and existing technologies at all constituent logical layers.• In support of stakeholders throughout the US Government, advised on the implications of findings.• Delivered concise, rigorous prototype implementations and formal reports. -
Graduate Assistant: Computer Science Dept.University Of Dayton Jul 2018 - Dec 2019Dayton, Oh, Us• Algorithms & Programming 1 and 2 (Java).• Media Apps (Python/Blender).• Help run Dr. Norm Bashias's student labs.• Mentor students on a one-to-one and one-to-many basis.• Grade and provide feedback for student assignments. -
Software Engineer - Security (Intern)Twilio Inc. May 2019 - Aug 2019San Francisco, California, Us• Wrote Dockerized application to dynamically load and run Python security and quality plugins on Github PRs as they're committed. • Utilized Celery task queue with Redis backend for PR monitoring.• Created documentation for engineers to author plugins to suit security and quality needs of their organization.• Partook in penetration tests, code reviews, and threat modeling for Twilio products and features. -
Cyber Security Software EngineerSiemens Plm Software Jan 2017 - Apr 2018Plano, Tx, Us• Tightened SDLC feedback loop by automating code analysis upon submission to CI system.• Worked cross-team to track down and address potential security concerns in C/C++ codebase.• Performed and validated continuous dynamic analysis of deployments improving product security. • Consistently evaluated new security tools to automate and integrate into our SDLC.• Created framework leveraging LDAP hierarchy for test coverage and security report accountability. -
Qa Solution DeveloperHyland May 2016 - Dec 2016Westlake, Oh, Us• Assist in basic design and implementation (front-end and back-end) of tools and applications to improve processes used by R&D departments.• Communicated cross-team to accommodate needs and design details from groups we supported. • Worked on C# MVC web app to save support and installs teams 90% of previous software packaging time. • Assist in training and support of end-users on developed applications.• Continue successful support of solution until no longer in use.
Joey Perme Skills
Joey Perme Education Details
-
University Of DaytonComputer Science -
University Of DaytonComputer Science -
John Carroll UniversityComputer Science -
St. Ignatius High SchoolFather Streicher Humanities Honors Program
Frequently Asked Questions about Joey Perme
What company does Joey Perme work for?
Joey Perme works for Netspi
What is Joey Perme's role at the current company?
Joey Perme's current role is dangerously curious.
What is Joey Perme's email address?
Joey Perme's email address is jo****@****ail.com
What schools did Joey Perme attend?
Joey Perme attended University Of Dayton, University Of Dayton, John Carroll University, St. Ignatius High School.
What are some of Joey Perme's interests?
Joey Perme has interest in Website Development, Computers, Team Building, Learning, Anything Really, Linux, Intelligence, Reading, Medical Journals And Health Studies, Global Politics.
What skills is Joey Perme known for?
Joey Perme has skills like Computer Hardware Troubleshooting, Computer Security, Computer Science, Computer Hardware, Computer Maintenance, Windows, Linux, Ubuntu, Mac Os X, Programming, Java, Javascript.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial