Josh Mitchell work email
- Valid
- Valid
- Valid
- Valid
Josh Mitchell personal email
Hello, my name is Josh Mitchell. I am a U.S. Air Force Veteran, experienced Security Researcher, and Data Scientist with over 15 years of proven experience in offensive and defensive security techniques. Expert in information assurance, data loss prevention, and the application of machine learning to protect customer privacy and achieve business goals. Skilled in providing technical guidance for incident response investigations and litigation support. Regular public speaker on cutting-edge security topics.Areas of Expertise:• Security Controls, Code Optimization, Code Integration• Software Engineering, Malware Analysis, Reverse Engineering• Vulnerability Analysis, Exploit Development • Data Science, Statistical Analysis, Machine Learning, Generative AI
-
Security EngineerAmazon Jun 2024 - PresentSeattle, Wa, Us -
Svp, Global Head Of Malware Analysis, Cyber Managed ServicesKroll Jun 2020 - Jun 2024New York, Ny, Us• Head the Malware Analysis and Reverse Engineering Group, providing technical guidance for incident response investigations, litigation support, artificial intelligence, and proactive engagements.• Utilize software reverse engineering to support investigations involving intrusion events, intellectual property theft, fraud, phishing campaigns, business email compromise, employee impropriety, and unauthorized access to network resources.• Communicate cyber risk analysis and assessments to C-suite leadership, legal counsel, and IT/InfoSec stakeholders.• Spearhead efforts to expand in-house capabilities through the design and implementation of cutting-edge analysis/detection-as-code pipelines, AI task-force modernization, standardization of reporting, and maturation of workflow processes. -
Amber AdvisorAmber Video Oct 2018 - Jan 2021San Francisco, California, UsAdvisory role in the development and integration of video verification product. -
Principal Cybersecurity ConsultantNuix Mar 2017 - Apr 2020Sydney, Nsw, Au• Collaborated with internal and external application security teams to provide reverse engineering, tool development, secure architecture, and vulnerability assessment services.• Provided CISO-level guidance on security risk management and compliance based on findings from internal and external penetration tests.• Directed incident response operations on internal breaches and conducted internal and external penetration tests.• Taught external classes on penetration testing and incident response and performed independent research to integrate results into product offerings. -
Senior Research ScientistOptiv Inc Oct 2013 - Mar 2017Denver, Colorado, Us• Conducted comprehensive vulnerability analysis, including source, static, and dynamic code-based reviews, identifying and exploiting vulnerabilities impacting billions of devices.• Discovered vulnerabilities in the Microsoft Windows platform, widely deployed open-source and closed-source software, and smartphone software.• Carried out software exploitation to bypass protection mechanisms such as ASLR, DEP, CFG, and other application and operating system mechanisms.• Eliminated exploitation artifacts by writing specialized code, including custom shellcode, continuation of execution, and ROP techniques. -
Security ResearcherAsurion Jul 2012 - Oct 2013Nashville, Tennessee, Us• Developed proprietary techniques to perform static and dynamic vulnerability and malware analysis tests on petabytes of Android applications across multiple markets.• Developed Android kernel and user-land exploit prevention mechanisms and detection techniques to improve customer security.• Developed Android anti-theft and update management applications/services. -
Vulnerability ResearcherEndgame Oct 2010 - Jul 2012Arlington, Va, Us• Developed software exploitation capabilities for Microsoft Windows, Android, and Symbian platforms. -
Sr. Software EngineerGeneral Dynamics Advanced Information Systems Sep 2008 - Oct 2010Fairfax, Va, Us• Oversaw the operation of a cutting-edge malware analysis laboratory, including task selection, prioritization, and training of junior members.• Performed malware analysis, including behavioral and code-based reviews, researching emerging malware capabilities and delivery techniques.• Integrated countermeasures and mitigation techniques into software development lifecycle processes.• Followed protocols for disassembly and reconstruction; reversed compiler-optimized, obfuscated, polymorphic, and metamorphic software; verified attack vectors.• Authored technical reports and reverse engineering course material.
Josh Mitchell Skills
Josh Mitchell Education Details
-
Southern Methodist UniversityData Science -
Park UniversityComputer Science
Frequently Asked Questions about Josh Mitchell
What company does Josh Mitchell work for?
Josh Mitchell works for Amazon
What is Josh Mitchell's role at the current company?
Josh Mitchell's current role is Security Engineer @ Amazon.
What is Josh Mitchell's email address?
Josh Mitchell's email address is jo****@****uix.com
What schools did Josh Mitchell attend?
Josh Mitchell attended Southern Methodist University, Park University.
What skills is Josh Mitchell known for?
Josh Mitchell has skills like Reverse Engineering, Malware Analysis, Security, Operating Systems, Computer Security, X86 Assembly, Network Security, Vulnerability Assessment, Vulnerability Research, Windows, Software Engineering, Ruby.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial