Neil Madden

Neil Madden Email and Phone Number

Lead Java Securiity Engineer @ Hazelcast
Stroud, GB
Neil Madden's Location
Stroud, England, United Kingdom, United Kingdom
Neil Madden's Contact Details

Neil Madden work email

Neil Madden personal email

n/a

Neil Madden phone numbers

About Neil Madden

Please note: I very rarely check LinkedIn and have turned off all notifications.

Neil Madden's Current Company Details
Hazelcast

Hazelcast

View
Lead Java Securiity Engineer
Stroud, GB
Website:
hazelcast.com
Employees:
150
Neil Madden Work Experience Details
  • Hazelcast
    Lead Java Securiity Engineer
    Hazelcast
    Stroud, Gb
  • Teya
    Principal Security Engineer
    Teya Jan 2025 - Present

Neil Madden Education Details

Frequently Asked Questions about Neil Madden

What company does Neil Madden work for?

Neil Madden works for Hazelcast

What is Neil Madden's role at the current company?

Neil Madden's current role is Lead Java Securiity Engineer.

What is Neil Madden's email address?

Neil Madden's email address is ne****@****fee.com

What is Neil Madden's direct phone number?

Neil Madden's direct phone number is (905) 319*****

What schools did Neil Madden attend?

Neil Madden attended University Of Nottingham, University Of Nottingham.

Who are Neil Madden's colleagues?

Neil Madden's colleagues are Prachuryya Barua, Gökhan Sarı, Anthony Griffin, Melike Celen, Ty Mytao, Jack Herrell, James Bussman.

Not the Neil Madden you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.