Kevin Stilwell Email and Phone Number
Kevin Stilwell work email
- Valid
- Valid
- Valid
- Valid
- Valid
Kevin Stilwell personal email
- Valid
- Valid
- Valid
Kevin Stilwell phone numbers
A developer with over eighteen years of application development and customer support experience with a focus on data automation and transformation across multiple business types.
-
Senior Application Security EngineerRecharge Feb 2022 - PresentSanta Monica, California, Us- Migrated static code scanning (SAST) and software composition analysis (SCA) from Veracode to Snyk suite of tools. Built out developer education and discussions around this effort.- Launched usage of the commercial version of Trufflehog to identify secrets in our environment.- Improve and expand usage of DAST (Netsparker); set up relevant integrations and add additional URLs for scanning.- Helped build out reporting and automations around Snyk, Trufflehog and Netsparker tools to assist decision makers in prioritizing security decisions. Assist other members of the Security team with integration setup/automation tasks. -
Application Security EngineerRecharge Aug 2021 - Feb 2022Santa Monica, California, Us- Identify, validate and push through fixes for issues that came out of security tool scanning (Bandit and Veracode). - Manage the Recharge bug bounty program (HackerOne); triage issues and assign to correct teams (and in some cases develop and push fixes) -
Senior Integration EngineerThreatconnect Mar 2020 - May 2021Arlington, Va, Us- Developed multiple playbook and job apps for the ThreatConnect Security Orchestration, Automation and Response (SOAR) and Threat Intelligence Platform (TIP) components. Job apps allow for automation of ingesting information into the ThreatConnect platform and playbook apps support automating workflows with third-party services in the ThreatConnect platform. Apps are built using Python and are supported by automated testing using the pytest framework.- Built a proof-of-concept workflow to support automated REST API testing of the core ThreatConnect components for the QA team using the Tavern tool (Tavern is a Python tool focused on testing of REST APIs that can run alongside pytest tests). -
Senior Software EngineerAssured Information Security (Ais) Jan 2019 - Mar 2020Rome, Ny, Us- Developer on an agent-less incident response/threat hunting framework used by several Air Force cyber protection teams. This was primarily developed using Python and Flask but there were sub components developed in Powershell and other programming languages.- Added new features, including new Flask-based REST API endpoints to support automation for third party platforms and adding encryption for stored sensitive values.- Supported the development and execution of training events; this included testing and writing labs and actually supporting the training events.- Built out docker and docker compose files and did testing for a proof of concept version of Metsponse that ran on Linux (Metasponse normally runs on Windows) and could be deployed via Docker. -
Data EngineerCofense Mar 2018 - Jan 2019Leesburg, Virginia, Us- Support and maintain infrastructure for in-house Extract/Transform/Load (ETL) Python-based framework. This includes taking ownership of development, bug fixes, adding unit tests using pytest to reduce regressions and general code enhancements and improvements. This also involved maintaining and expanding the cron entries that were used to run the ETL framework across multiple cloud VM instances.- Worked on a proof of concept to move the Python ETL framework to run on Docker. This was to avoid having to run full VM instances to run the ETL framework.- Supported deployment and testing of the ETL framework in multiple geographic locations (USA, Canada and Europe) to meet customer and regulatory needs for data to be stored locally. This included changes to the ETL framework to specifically not process certain kinds of data when running outside of the USA.- Added six additional data sources via the ETL framework to the Azure Data Warehouse instance. This included several internal data sources via database replica access (Postgres and MariaDB) and REST API based sources across multiple SaaS platforms like Zendesk and JIRA. This work was to facilitate the creation of Splunk content replacing third-party tools used previously for this analysis.. -
Intelligence Solutions Engineer, ManagerPhishme, Inc. Apr 2016 - Mar 2018Leesburg, Virginia, Us- Assisted customers with usage of Cofense Intelligence integrations from POC through deployment and ongoing support. As part of this work, I figured out how to install Python 2.7 and pip on CentOS 6 to support customers using that version.- Supported several third-party development teams that were building integrations for Cofense Intelligence; this involved supporting meetings with developers and testing/feedback provided for the third-party integrations.- Helped mentor team members on Python best practices and standards for use of source control and testing. Built pytest and pyresttest (a now deprecated Python REST API testing framework) tests for our integration library.- Several enhancements and maintenance changes to the core Cofense Intelligence integration library (phishme_intelligence on PyPI). This library allowed customers to pull Cofense Intelligence in a variety of formats for customer-specific integrations and also was utilized by most of the Cofense Intelligence platform specific integrations. - Developed, enhanced and troubleshot Cofense Intelligence Python-based integrations for a variety of platforms, including ThreatConnect, FireEye Security Orchestrator (FSO), and Recorded Future.- Rebuilt, restructured and expanded documentation using Sphinx and Restructured Text (RST) to make documentation versioning and customization easier.- Promoted to team manager in October 2017, provided technical support and leadership to assigned team and management assistance to the Director of Solutions Engineering. Worked with the team to continue to build out Agile-based development setup to improve efficiency and tracking of tasks and worked with Cofense Support to transfer Level 1 support tasks to free up resources to support core integration tasking. -
Reporter Solutions EngineerPhishme, Inc. Jun 2014 - Mar 2016Leesburg, Virginia, Us- Provided ongoing assistance to customers in deploying PhishMe Reporter, an integrated email client solution that allows users to easily report suspicious emails to their security teams and is deployed to over 8 million endpoints. This work included overview and demonstrations of Reporter for interested customers and troubleshooting specific customer issues. - Worked with external developers in relation to Reporter development. This included providing direction and feedback to developers and investigating source code for issues.- Produced and enhanced documentation in support of Reporter on Outlook, Google Apps, and Notes platforms. This includes presentations, FAQs and installation/configuration documentation.- Developed and provided ongoing support for a version of Reporter for Outlook on Mac using Applescript and Unix command line tool integration. -
Adjunct LecturerUtica University Apr 2012 - Dec 2014Utica, New York, Us- Provided instructional support to a fifteen student class in the Cybersecurity: Intelligence & Forensics program.- Graded six group and individual labs and provided an APA citation grade for the final exam.- Built and taught an introduction to information security for a undergraduate 8-week online course. Built new labs and quiz/short essay assignments. -
Senior Software EngineerExelis Sep 2003 - May 2014Us- Developed a Microsoft Outlook 2007/2010 plugin in C# and Visual Studio Tools for Office (VSTO) that provided a one click solution for submitting suspicious emails to the company’s Cyber Incident Response Center (CIRC) that was deployed to 20K company workstations.- Developed a backend software plugin in C# and VSTO for Microsoft Outlook 2010 that performed initial filtering of submitted suspicious emails and integrated the submissions into the company CIRC workflow. Integrated existing custom test framework into code infrastructure as part of the ISSE 4.1 development effort, and configured and executed tests using Bash scripting and Java.- Participated in development of 3.6.0.4 & 3.6.1.3 version of ISSE Guard. Also did development work on several automated message processing threads for ISSE Guard. - Implemented PHP parsing code to process USMTF messages into a XML intermediate format in order to execute user-specified filters with XQuery for the Rule Enforcement Message Console (REMC), allowing operators to perform manual changes and automatic filters on ACO and ATO messages. Resolved issues and added functionality to the REMC front-end using the JQuery Javascript library. Added features to the transfer of audits from the non-controlling security domain to the controlling security domain using Java and C for the ISSE 4.1 development, including adding the ability to specify times for automated archive audits and the capacity to transfer audits across security domains as automated or manual audit archive actions. -
Software Development InternAir Force Research Laboratory Jun 2000 - Aug 2003Wright-Patterson Afb, Oh, Us- Developed the subscriber portion of the Outlook Y-JBI email-based Publish & Subscribe prototype demonstration in the Joint Battlespace Infosphere (JBI) with Visual Basic 6.0 and XML.- Created demonstrations of Joint Battlespace Infosphere (JBI) capabilities for the C4ISR 2003 Summit involving publishing and subscribing to images taken from a webcam using Java, XML, & XML Schema.- Extended the functionality of the Java-based Common Mapping API (CMAPI) by adding the ability to draw an orbit on a map.
Kevin Stilwell Skills
Kevin Stilwell Education Details
-
Utica UniversityCybersecurity: Intelligence & Forensics -
Suny Polytechnic InstituteComputer & Information Science -
Mohawk Valley Community CollegeProgramming And Systems
Frequently Asked Questions about Kevin Stilwell
What company does Kevin Stilwell work for?
Kevin Stilwell works for Recharge
What is Kevin Stilwell's role at the current company?
Kevin Stilwell's current role is Senior Application Security Engineer at Recharge Payments.
What is Kevin Stilwell's email address?
Kevin Stilwell's email address is ke****@****ail.com
What is Kevin Stilwell's direct phone number?
Kevin Stilwell's direct phone number is +170365*****
What schools did Kevin Stilwell attend?
Kevin Stilwell attended Utica University, Suny Polytechnic Institute, Mohawk Valley Community College.
What skills is Kevin Stilwell known for?
Kevin Stilwell has skills like Computer Security, Security, Software Development, Information Security, Java, Linux, Network Security, Unix, Xml, Testing, Vulnerability Assessment, Software Engineering.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial