Marcus Hodges

Marcus Hodges Email and Phone Number

Security Partner @ Meta @ Meta
Marcus Hodges's Location
Seattle, Washington, United States, United States
Marcus Hodges's Contact Details

Marcus Hodges work email

Marcus Hodges personal email

About Marcus Hodges

Hello, I’m Marcus. I lead product security and architecture for Meta’s augmented reality (AR) glasses - silicon to cloud. As the Security Partner for AR, I navigate security challenges at scale, provide direction, and partner with engineering teams and leadership to make our devices and experiences trustworthy. I am an accomplished product security professional and people manager with over 17 years of experience building and breaking systems at every layer of the stack.Prior to joining Meta, I was the Director of Research, Engineering Manager, and a Principal Security Engineer at Security Innovation, where I spent many years penetration testing and consulting on application security. I was also the system architect and EM supporting a team to design, develop, and maintain a secure Linux distribution for the U.S. government. I led research on advanced exploitation techniques, IoT, and hardware security. I have a comprehensive B.S. in Mathematics from the University of Washington and was formerly a very active CTF player. I am the head organizer of the team currently hosting DEFCON’s OpenCTF competition and have spoken at several security conferences on various topics including the development of custom rootkits and hardware privacy. On weekends, whether I’m replacing an electric panel or rebuilding an engine, more often than not I’m renovating houses or wrenching on cars or writing code. I've also raced a sailboat across the Pacific ocean, have a private pilots license, and enjoy, welding, hiking, camping, gardening, cooking, roasting coffee, or otherwise enjoying life with my wife and kids.

Marcus Hodges's Current Company Details
Meta

Meta

View
Security Partner @ Meta
Marcus Hodges Work Experience Details
  • Meta
    Security Partner
    Meta Mar 2019 - Present
    Menlo Park, Ca, Us
    • Deputy CISO for Meta's Augmented Reality organizations. Directly responsible for security of our AR glasses hardware, software, experiences, and services supporting approximately 3000 people.• Developed the security roadmap, maturity criteria, and methodologies for managing product security risks.• Led the cross-functional effort and authored Meta's security standards for biometric auth on AR/VR devices. Partnered with system and silicon architects to design of our secure coprocessors and AI accelerators including TrustZone and DSPs.• Collaborated with experts in adversarial AI and Presentation Attack Detection (PAD) to establish baselines for biometric ML accuracy (FAR), resilience, and avoid bias, for novel biometric modalities.• Designed the cryptography, infrastructure hardening, and physical security for a fleet of custom 18 wheeler petabyte-scale data centers on wheels.• Co-designed the hardware privacy features for AR devices, that gives users hardware control over sensors, with the lead silicon architect and electrical engineers. Led a large XFN effort to align more than 15 stakeholders teams on the product strategy and technical design.• Co-leader of the security strategy for privacy preserving computation in the cloud using TEEs. Advised on tradeoffs between TEE and E2EE strategies.• Designed the cryptography and protocol for the secure communication between consumer devices and Intel SGX enclaves (TEE) in the cloud which integrated X3DH with Intel SGX attestation primitives. • Provided business direction, process improvements, data protection strategies, and technical controls to secure our outsourced ML data collection and labeling work.• Led the security strategy and sandbox architecture for the integration of our voice assistant with large third party appliances and cloud services.• Supported Meta’s RedTeam by identifying campaign opportunities, facilitating engagements, and helping support RT operations to help evolve our security posture.
  • Ioxt Alliance
    Member Board Of Directors
    Ioxt Alliance Oct 2020 - Jan 2022
    Costa Mesa, California, Us
    * Member of the Board of Directors of the ioXt Alliance* Partnered with leaders from Google, Amazon, Comcast, Legrand, Silicon Labs, Resideo, Zigbee, and others to set standards for the security of the security of the Internet of Things (IoT) * Established and chaired the IoT Privacy Extension working group to extend the IoT security vision with trustworthy standards for privacy.
  • Security Innovation
    Director Of Research
    Security Innovation Sep 2013 - Dec 2018
    Wilmington, Ma, Us
    • Bootstrapped a research organization to incubate new security techniques, expand corporate abilities, advance the state-of-the art, and cultivate employee skills• Mentored over 20 research projects including netfilter modules, advanced fuzzing, symbolic execution, embedded device security, and blockchain• Established a practice of providing application security expertise to open source projects to raise the security bar for core industry software• Fostered a culture of knowledge sharing that produced over 50 internal tech talks• Collaborated with the University of Washington to mentor and train student CTF and CCDC teams• Built a hardware hacking lab and expanded our IoT and embedded device research and pentesting
  • Security Innovation
    Engineering Manager / System Architect
    Security Innovation Nov 2011 - Dec 2018
    Wilmington, Ma, Us
    • Managed a team of 10 developers to design, develop, test, deploy, and maintain a custom, highly secure, Ubuntu-based, Linux distribution for the U.S. Federal Judiciary with over 700 production systems in 231 locations• Managed people, project priorities, deadlines, and deliverables• Defined complete system architecture including functional and security requirements• Developed Linux kernel modules, application sandboxing, system hardening, and enterprise management tools• Developed customized fork of Firefox including enterprise policy configuration extensions, domain access controls, and specialized domain specific UI• Responsible for client relationships, product management, development process, UX, and product vision• Collaborated with business partners to understand their unique needs ensure that technical designs satisfied requirements• Designed remote troubleshooting and system diagnostic tools including crash log analysis and AppArmor profile tuning• Personally managed all Tier 3 support operations for 97 unique clients with contractual SLAs• Established and streamlined SDL for quality assurance (QA) and security testing including a repeatable release process and database of test plans• Designed Debian package repository management web services with secure key management and automatic dependency resolution
  • Security Innovation
    Principal Security Engineer
    Security Innovation Nov 2011 - Dec 2018
    Wilmington, Ma, Us
    • Recruited and interviewed technical candidates to grow the security engineering team by over 50 engineers• Performed a PCI gap analysis for a Level 1 Service Provider and designed solution to completely isolate CDE with one-way-doors• Assessed the security of government enterprise Java EE / Perl applications with millions of active users; discovered and remediated numerous critical vulns including RCE, EoP, and complete auth bypass• Provided security guidance for the secure design of SSO, MFA, web services, and password reset systems• Advised on the security of cryptography, network protocols, native code, memory corruption, secure libraries, API design, and infra• Established industry leading Threat Modeling methodology that redefined our professional services offerings • Designed systems to protect privacy that exceed GDPR• Authored blog articles on advanced exploitation (ROP), and cryptanalysis, and advanced web security techniques• Developed a binary exploitation framework for CTFs in Python• Created an engineer recruiting website with binary and web hacking challenges
  • Security Innovation
    Senior Security Engineer
    Security Innovation Aug 2009 - Nov 2011
    Wilmington, Ma, Us
    • Developed an asynchronous Python TCP/IP network library with coroutines and Epoll for brute force, discovery, and automated web service testing• Reverse engineering and dynamic analysis with IDA Pro, GDB, strace, PIN, and Capstone• Analyzed security of embedded Linux devices for secure boot, system image integrity, key management, hardware attacks, SPI flash, JTAG/UART, and DMA attacks• Hardened Linux systems with AppArmor, seccomp, capabilities, iptables, and secure configurations• Linux system developer (Python, C, Qt/QML, GTK/glade, D-Bus, udev rules, cgroups, IPC, system)• Customized several open source applications including Firefox, Evince, and XFCE to improve security
  • Security Innovation
    Security Engineer
    Security Innovation Mar 2007 - Aug 2009
    Wilmington, Ma, Us
    * Focused on application security code reviews, penetration testing, and threat modeling* Implemented an ActiveX fuzzer with automated API discovery and core dump exploit analysis* Improved reporting templates and authored articles for Java security for eLearning coursework * Web application testing with Burp for XSS, SQLi, CSRF, command injection, and session management * Penetration testing with nmap, Metasploit, Sqlmap, Wireshark, scapy, sslyze, netcat, and Python
  • Self-Employed
    Freelance Software Developer
    Self-Employed 2003 - 2006
    * Streamlined return management department for online retailer* Statistical analysis of business process to optimize throughput* RMA ticket tracking website in C#

Marcus Hodges Skills

Computer Security Penetration Testing Security Cryptography Linux Web Application Security Application Security Virtualization Perl Python Security Research Vulnerability Assessment Reverse Engineering Ctf Code Review Firewalls Static Analysis Information Security Security Architecture Design Vulnerability Management Owasp

Marcus Hodges Education Details

  • University Of Washington
    University Of Washington
    Mathematics (Comprehensive)

Frequently Asked Questions about Marcus Hodges

What company does Marcus Hodges work for?

Marcus Hodges works for Meta

What is Marcus Hodges's role at the current company?

Marcus Hodges's current role is Security Partner @ Meta.

What is Marcus Hodges's email address?

Marcus Hodges's email address is 0x****@****ail.com

What is Marcus Hodges's direct phone number?

Marcus Hodges's direct phone number is +197869*****

What schools did Marcus Hodges attend?

Marcus Hodges attended University Of Washington.

What are some of Marcus Hodges's interests?

Marcus Hodges has interest in Python, Mathematics, Hacking, Cryptanalysis, Linux, Pattern Recognition, Software Security, Open Source.

What skills is Marcus Hodges known for?

Marcus Hodges has skills like Computer Security, Penetration Testing, Security, Cryptography, Linux, Web Application Security, Application Security, Virtualization, Perl, Python, Security Research, Vulnerability Assessment.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.