Justin W. Email and Phone Number
Justin Warner is a Principal Threat Intelligence Lead at Microsoft, where he helps to lead a global effort in discovering, tracking, and disrupting the world's most persistent threats to Microsoft customers. In this role, he manages cyber threat intelligence analysis of state-aligned and criminal threat actors that span Microsoft's product and service offerings, while partnering with other security research teams to protect Microsoft customers. Prior to Microsoft, Justin's career has ranged from highly technical cybersecurity roles to senior leadership positions where he oversaw strategy and delivery of security products and services for several companies, giving him a diverse experience and understanding of the challenges practitioners face. Justin holds a bachelor’s degree in computer science with a specialization in cyberwarfare from the US Air Force Academy. Justin is currently pursuing a Juris Masters degree at George Mason University Antonin Scalia Law School focused on cyber and national security law.
Microsoft
View- Website:
- microsoft.com
- Employees:
- 189892
-
Principal Threat Intelligence AnalystMicrosoft May 2021 - PresentReston, Virginia, United StatesLeads the Threat Analysis Branch of the Microsoft Threat Intelligence Center. Manages cyber threat intelligence analysis of state-aligned and criminal threat actors that span Microsoft's product and service offerings, while partnering with other security research teams to protect Microsoft customers -
Sr. Director Of Applied Threat ResearchGigamon Feb 2019 - Mar 2021RemoteLed and managed all functions within the Applied Threat Research team to include threat intelligence, detection engineering, and security research and analytics. Directed strategic and operational efforts to leverage knowledge of threat actor tactics, techniques, and procedures to provide cutting-edge detection capabilities and ultimately dismantling a threat's ability to harm our customers. Key Achievements:▪ Founded and launched ATR’s Threat Intelligence Team which included the stand-up of internal collection sources, defining processes for analyzing and disseminating intelligence internally, and communicating to key stake-holders relevant threat information. ▪ Supported high-visibility incident response engagements through intrusion analysis and targeted threat research of various financially motivated threat actors and state sponsored threat groups. ▪ Worked end-to-end operations leveraging intelligence collection from internal/external sources and large-scale data analytics to effectively perform threat detection and deep-dive network forensics. -
Principal Security Engineer, Applied Threat ResearchGigamon Jul 2018 - Feb 2019Washington D.C. Metro AreaServed as the technical lead of Detection Engineering and Threat intelligence. Researched and tracked threats in support of internal consumers and to drive detection engineering efforts. Emulated threat behaviors for the purpose of developing, engineering, and prototyping detection capabilities across a range of collection platforms as well as in Gigamon ThreatINSIGHT. Built and maintained indicators and behavioral analytics for threat detection.Key Achievements: ▪ Discovered and tracked a botnet of 100+ malicious Chrome extensions with over 500,000 downloads being used for a large-scale fraud operation. Collaborated with internal Google teams to assist in detection and takedown of the extensions & infrastructure.▪ Assisted in discovery and analysis of two distinct Adobe Flash exploits being used in-the-wild by threat actors to compromise high profile targets of interest. Authored file-based IOCs for campaign tracking. ▪ Collaborated with external partners and law enforcement for intelligence sharing to combat efforts of criminal threat groups through timely sharing of intelligence discoveries. -
Principal Security Engineer, IcebrgIcebrg Mar 2017 - Jul 2018Washington D.C. Metro AreaServed as a Principal Security Engineer working across teams, from services to threat research, to provide threat expertise internally and externally. Supported highly-technical incident response and threat hunting engagements by providing network forensics, threat intelligence, intrusion analysis, and malware analysis services to incident response partners. Led security R&D efforts for the purpose of advancing the state of our product including initial efforts to develop and build behavioral threat detection capabilities. -
Director Offensive Services (Red Team Lead)Veris Group, Llc Sep 2014 - Mar 2017Led red team operations, threat emulation exercises, and other offensive services for a mix of federal agencies as well as Fortune 100 companies to provide hands-on training on threat research and response. Worked collaboratively with customers to create heuristics and analytics to detect adversary tradecraft within their environment and verified heuristics during live exercises. Managed team of highly technical consultants and researchers performing research into attack techniques.Key Achievements:▪ Mentored and guided security research efforts to discover attack techniques, understand their impact, identify artifacts of the attack, and prototype countermeasure recommendations. ▪ Instrumental in the creation of DHS’s NCATs Red Team service offering, providing sophisticated red team operations lasting over 4 months in length for federal agencies. ▪ Developed Adaptive Red Team Tactics and Adaptive Red Team Operations courses offered internally to several high-end commercial entities. Functioned as lead instructor at Blackhat USA (2015 and 2016). -
Cyber Operations OfficerUnited States Air Force May 2010 - Sep 2014Led Computer Network Operations (CNO) to support Computer Network Defense (CND) efforts of US Government networks against Advanced Persistent Threats (APT) and to satisfy high-priority foreign intelligence requirements. Performed reverse engineering, malware analysis; network and endpoint forensics; and infrastructure analysis for the purpose of collecting and analyzing intelligence for key stakeholders. Assigned to the 7th Intelligence Squadron at Ft. Meade where he supported the US Intelligence Community and the National Security Agency (NSA) in the following roles: Student, UCT & INWT - 2010-2011Analyst - 2011-2012Technical Lead - 2012 -2013Team Lead - 2013 - 2014
Justin W. Education Details
-
Cyber And National Security Law -
Computer Science W/ Focus In Cyber Warfare -
Us Air Force - Intermediate Network Warfare Training -
Us Air Force - Undergraduate Cyber Warfare Training
Frequently Asked Questions about Justin W.
What company does Justin W. work for?
Justin W. works for Microsoft
What is Justin W.'s role at the current company?
Justin W.'s current role is Principal Threat Intelligence Lead @ Microsoft.
What schools did Justin W. attend?
Justin W. attended George Mason University - Antonin Scalia Law School, United States Air Force Academy, Us Air Force - Intermediate Network Warfare Training, Us Air Force - Undergraduate Cyber Warfare Training.
Who are Justin W.'s colleagues?
Justin W.'s colleagues are Naira Marielle Sousa, Lloyd Jaydell Quiambao, Chaitanya Pavan Penumarthy, Shreya Masurkar, Adam Mostafa, Carlos Mtz, Laura Bigelow.
Not the Justin W. you were looking for?
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial