Matthew Hall

Matthew Hall Email and Phone Number

Co-Founder @ Stealth Mode Startup
California, United States
Matthew Hall's Location
San Francisco Bay Area, United States, United States
Matthew Hall's Contact Details
About Matthew Hall

I bridge the boundaries between security and product development, ensuring that the theories of security and performance are applied correctly in real life.I have shipped security software products using C, C++, sed, awk, shell scripting, Java, Python, Perl, and Ruby, as well as providing design and architectural oversight and security administration up to Internet scale.I have a broad knowledge base ranging from Linux, UNIX, Windows, POSIX APIs, network security, network design, network management (sFlow, SNMP, Syslog, etc.), routing, switching, firewalling, secure programming, network programming, and SDN (software-defined networking), all the way out into performance engineering, multithreading, applied statistics, and technical writing.Specialties: Fluent in English and German.

Matthew Hall's Current Company Details
Stealth Mode Startup

Stealth Mode Startup

View
Co-Founder
California, United States
Matthew Hall Work Experience Details
  • Stealth Mode Startup
    Co-Founder
    Stealth Mode Startup
    California, United States
  • Resilience
    Co-Founder, Vp Of Labs
    Resilience Oct 2016 - Present
    New York, Us
  • Mv Security, Llc
    Independent Business Owner
    Mv Security, Llc Oct 2016 - Present
    Independent security consulting.
  • Threatstream
    Sr. Security Software Engineer
    Threatstream Jun 2014 - Oct 2016
    Senior engineer at the market leader in security threat intelligence.
  • Threatstream
    Security Services Architect
    Threatstream Jun 2014 - Oct 2016
    Professional services and consulting at the market leader in security threat intelligence.
  • Morta Security Acquired By Palo Alto Networks
    Sr. Staff Engineer
    Morta Security Acquired By Palo Alto Networks Aug 2013 - May 2014
    Senior engineer in a company founded by ex-NSA and ex-military experts in mitigating APTs (advanced persistent threats).Responsible for creating a stable, reliable, and high-performance network-based APT infection detection system, capable of finding Zeus, ZeroAccess, et. al.
  • Cisco Systems
    Software Engineer - Identity Services Engine - Sampg
    Cisco Systems Jan 2013 - Aug 2013
    San Jose, Ca, Us
    Senior developer of the Cisco ISE product, specializing in MDM (mobile device management), secure automated endpoint provisioning using RFC 5280 compliant PKI based techniques.Created a secure automated high-performance SSL CA (Certificate Authority) and RA (Registration Authority) for enabling certificate-based authentication by mobile, laptop, and desktop systems.
  • Mu Dynamics
    Senior Network Protocol Software Engineer
    Mu Dynamics Oct 2011 - Dec 2012
    Sunnyvale, Ca, Us
    Create and maintain custom protocol stacks and protocol parsers in Ruby for DNS, SSL, TLS, TLSv1.2, TCP and other key Internet protocols used by NEMs, Telecommunications companies, ISPs, etc. to do fuzz testing and protocol mutation testing on DPI (deep packet inspection) firewalls and other network equipment using the Mu Studio Security solution.Used Intel DPDK (Data Plane Development Kit), Linux, oprofile, et. al. to develop a high performance 10-gigabit-plus network security and performance testing appliance.Find security problems in common open source network applications and report them in security advisories in accordance with industry responsible disclosure practices.Assist customers and support team with prompt resolution of any issues with the operation of the product.
  • Spirent Communications
    Staff Engineer - Sr. Member Technical Staff - Network Protocols
    Spirent Communications Oct 2011 - Dec 2012
    San Jose, California, Us
    Part of the Mu Dynamics, Inc. team which was acquired by Spirent for US $40 million in April, 2012.Rearchitecting the Mu Studio Security solution from J2EE to Ruby using CouchDB / Couchbase, Redis, ZeroMQ, EventMachine, etc. to improve software currency in the codebase.Create and maintain custom protocol stacks and protocol parsers in Ruby for DNS, SSL, TLS, TLSv1.2, TCP and other key Internet protocols used by NEMs, Telecommunications companies, ISPs, etc. to do fuzz testing and protocol mutation testing on DPI (deep packet inspection) firewalls and other SDN based network equipment using the Mu Studio Security solution.Used Intel DPDK (Data Plane Development Kit), Linux, oprofile / perf, et. al. to develop a high performance 10-gigabit-plus network security and performance testing appliance.Find security problems in common open source network applications and report them in security advisories in accordance with industry responsible disclosure practices.Assist customers and support team with prompt resolution of any issues with the operation of the product.
  • Yahoo!
    Paranoid Yahoo!
    Yahoo! Jul 2010 - Oct 2011
    Sunnyvale, Ca, Us
    A member of Yahoo's information security team, with a wide range of job responsibilities in a demanding environment.I am a key subject matter expert on secure networking (network design, network programming and software architecture), vulnerability scanning, network monitoring and management, and agile software development practices and continuous integration.Developer and operator of a custom vulnerability scanning and monitoring system which protected an Internet scale network with 200,000+ devices across multiple continents, finding insecure configurations and ensuring everything complied with company auditing rules (PCI-DSS, best pratices, etc.).Member of a multi departmental network architecture and defense group which worked together to protect against large DoS and DDoS attacks on a carrier class backbone.Main security contact for Yahoo!'s successful participation in the World IPv6 Day. Helped find the right stakeholders for all necessary security audits and approvals and cooperated with researchers to post-process the day's access logs to identify key metrics for presentation to other NANOG members.
  • Hewlett-Packard
    Security Solutions Engineer (Nim Software)
    Hewlett-Packard Jun 2006 - Jun 2010
    Houston, Texas, Us
    Develop network behavior anomaly detection technology for ProCurve Network Immunity Manager. Uses traffic samples to detect security threats based on statistical node behavior baselining. Lead and interact with various research teams inside and outside HP to develop new intellectual property to enhance the capabilities of this product.Apply network programming knowledge to create scalable multi-platform sFlow, SNMP, and Syslog collectors and anomaly analyzers for hundreds of devices and thousands of ports.Integrated third-party UTM, IDS, and IPS devices into ProCurve Network Immunity Manager to create a seamless network security management solution.
  • Hewlett-Packard
    Security Solutions Engineer (Tmszl Module)
    Hewlett-Packard Jun 2006 - Jun 2010
    Houston, Texas, Us
    Member of an embedded software development team for a UTM (firewall, IPS, VPN, antivirus) stack which runs on a ProCurve switch blade.Provide a broad-based understanding of network security to the development team using detailed understanding of network protocols, security, and competitive products such as Cisco PIX, Sourcefire Snort, et. al.Develop C code to implement RADIUS authentication and other features required in the UTM. Test, debug, profile, and audit implementation to ensure high quality of product.Specialize in maintaining a team test network environment and associated unit tests in Ruby as part of a SCRUM-based agile development approach.
  • Verizon Wireless
    Co-Op
    Verizon Wireless Jan 2005 - Aug 2005
    Basking Ridge, Nj, Us
    Saved time and money and made the team more productive by creating an improved XML output file validator and multithreaded file processor.Developed accurate, cost-effective solutions to billing problems using Solaris, C, C++, and AWK, as well as Oracle, SQL, and XML.Led the group's development efforts for several cross-department implementations.

Matthew Hall Skills

Network Security Linux Perl Unix Security Tcp/ip Firewalls Shell Scripting Software Development Networking Java C Computer Security Software Engineering Agile Methodologies Routing Switches Information Security Network Design Ssl Network Programming Network Engineering Intrusion Detection Dns Operating Systems Python Traffic Analysis Ruby Open Source Windows C++ Network Administration Performance Tuning Lan Switching Debuggers Sflow Snmp Ip Network Management Software Traffic Management Debugging Performance Testing Internet Protocol Suite Statistics Cellular Communications Software Defined Networking Sdn Cellular Netflow Agile

Matthew Hall Education Details

  • University Of The Pacific
    University Of The Pacific
    German

Frequently Asked Questions about Matthew Hall

What company does Matthew Hall work for?

Matthew Hall works for Stealth Mode Startup

What is Matthew Hall's role at the current company?

Matthew Hall's current role is Co-Founder.

What is Matthew Hall's email address?

Matthew Hall's email address is mh****@****nce.com

What is Matthew Hall's direct phone number?

Matthew Hall's direct phone number is +1.408.526*****

What schools did Matthew Hall attend?

Matthew Hall attended University Of The Pacific.

What are some of Matthew Hall's interests?

Matthew Hall has interest in Barbecuring, Cooking, Economic Empowerment, Reading, Science And Technology, Music Performance, Open Source.

What skills is Matthew Hall known for?

Matthew Hall has skills like Network Security, Linux, Perl, Unix, Security, Tcp/ip, Firewalls, Shell Scripting, Software Development, Networking, Java, C.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.