AeroLeads people directory · profile

Pedram Amini Email & Phone Number

Founder, Hacker, Investor, Advisor | Chief Scientist OPSWAT at OPSWAT
Location: Austin, Texas, United States 17 work roles 2 schools
2 work emails found @inquest.net 7 phones found area 512, 202, 415, 281, 943, 800, and 027 LinkedIn matched
✓ Verified May 2026 4 data sources Profile completeness 100%

Contact Signals · 2 work emails · 7 phones

Work email p****@inquest.net
Direct phone (512) ***-****
LinkedIn Profile matched
3 free lookups remaining · No credit card
Current company
Role
Founder, Hacker, Investor, Advisor | Chief Scientist OPSWAT
Location
Austin, Texas, United States

Who is Pedram Amini? Overview

A concise factual answer block for searchers comparing this professional profile.

Quick answer

Pedram Amini is listed as Founder, Hacker, Investor, Advisor | Chief Scientist OPSWAT at OPSWAT, based in Austin, Texas, United States. AeroLeads shows a work email signal at inquest.net, phone signal with area code 512, 202, 415, 281, 943, 800, 027, and a matched LinkedIn profile for Pedram Amini.

Pedram Amini previously worked as Chief Scientist at Opswat and Advisor/Evangelist 0Din GenAI Bug Bounty Program at Mozilla. Pedram Amini holds Bs, Computer Science from Tulane University.

Company email context

Email format at OPSWAT

This section adds company-level context without repeating Pedram Amini's masked contact details.

{first}@inquest.net
89% confidence

AeroLeads found 2 current-domain work email signals for Pedram Amini. Compare company email patterns before reaching out.

Profile bio

About Pedram Amini

Security researcher, bug bounty pioneer, published author, founder, investor, advisor, local business owner, and hacker of all things. Strong background in reverse engineering and creative problem-solving skills. I've presented a variety of research at security conferences such as BlackHat, DefCon, RECon, Ekoparty, Microsoft Bluehat, ShmooCon, ToorCon, Virus Bulletin; and taught numerous sold-out courses on reverse engineering.Specialties: reverse engineering, software engineering, management, public speaking, cloud architecture, amazing ping pong and foosball skills. Fluent in various languages including Python, C, C++, x86-64 Assembly, PHP, Perl, Lisp, SQL... some say I can talk to dogs, the dogs agree.#SecurityFounder #SecurityTinkerer

Listed skills include Security Research, Computer Security, Reverse Engineering, Security, and 16 others.

Current workplace

Pedram Amini's current company

Company context helps verify the profile and gives searchers a useful next step.

OPSWAT
Opswat
Founder, Hacker, Investor, Advisor | Chief Scientist OPSWAT
AeroLeads page
17 roles

Pedram Amini work experience

A career timeline built from the work history available for this profile.

Chief Scientist

Current

Tampa, Florida, US

OPSWAT specializes in cybersecurity solutions for critical infrastructure, focusing on protecting IT and OT environments from file-borne threats, malware, and other cyber risks. The MetaDefender platform offers a comprehensive suite of products including file security, email security, threat intelligence, and secure access solutions.

Aug 2024 - Present

Advisor/Evangelist 0Din Genai Bug Bounty Program

Current

San Francisco, CA, US

The 0Day Investigative Network (0Din) by Mozilla, is a bug bounty program for large language models (LLMs) and other deep learning technologies. 0Din expands the scope to identify and fix GenAI security by delving beyond the application layer with a focus on emerging classes of vulnerabilities and weaknesses in these new generations of models.Learn.

Jun 2024 - Present

Advisor And Evangelist

Current

Austin, Texas, US

Exodus Intelligence provides clients with actionable information, capabilities, and context for both n-day and zero-day vulnerabilities and exploits. Delivering elegant research to customers in multiple digestible formats since 2012, Exodus is looking for offensive researchers to join the team. If infosec is a passion and not a job, reach out and let's.

Mar 2020 - Present

Investor

Current

Santa Monica, California, US

AI-powered platform to protect devices against emerging firmware threats. Not talking about IOT here. Rather Windows and Linux servers.

Jun 2022 - Present

Host

Current

hoedown | ˈhōˌdoun | noun North Americana social gathering at which lively folk dancing takes place. a lively folk dance.There likely won’t be dancing, but… we gather for technical lightning talks, libations (open bar), and Coopers BBQ at San Jac Saloon once a year.Feel free to bring laptops as power and WiFi are accessible. Recommend utilizing rideshare.

Jun 2019 - Present

Investor

Current

Washington, District Of Columbia, US

GreyNoise Intelligence is a cybersecurity company based in Washington DC. GreyNoise analyzes Internet background noise. Customers use GreyNoise to remove pointless security alerts, find compromised devices, and identify emerging threats.

Mar 2019 - Present

Owner

Current

Austin, TX, US

Authentic Texas bar in a historic building. Two venues. Two vibes. Two-step if you want. Live music daily. Local craft beers. High end sipping whiskey.The second floor of the saloon is regularly available for private events most nights of the week. We're happy to host corporate gatherings, customer appreciation parties, birthdays, and any other cause for.

Jun 2015 - Present

Investor And Advisor

Current

Los Altos, California, US

AttackIQ's FireDrill provides a single SaaS platform to test your entire infrastructure. Backed by a talented team, FireDrill continually challenges your network with AttackIQ’s curated inventory of attack and validation scenarios.

Mar 2014 - Present

Investor

Current

San Francisco, CA, US

Web3 and AI data intelligence... EdgeIn leverages the power of AI and personalized human intelligence to gather, refine, and deliver the investor, company, event, and news data you need to get an edge.

Jun 2021 - Present

Cto, Acquired By Opswat

Austin, Texas, US

The leader in File Detection and Response. Protecting end users from the myriad of attacks of today and the evolving threats of tomorrow.Founded in 2013 by a well-versed team hailing from both the public and private sectors. Our platform was purpose-built by SOC analysts for SOC analysts and network defenders. With capabilities in attack prevention, breach.

Sep 2015 - Aug 2024

Investor, Acquired By Gitlab.

Tel Aviv, IL

Oxeye provides noise cancellation for application security. Developed for cloud native applications - microservices-based applications that use containers and Kubernetes, Oxeye's application security solution removes the noise of false positives, and prevents false negatives by collecting and analyzing comprehensive data on the 5Cs of cloud native.

Sep 2022 - Mar 2024

Investor, Acquired By Hpe.

Houston, Texas, US

Helping engineers securely and easily build identity-driven, large-scale distributed software systems. Founded in 2017 and acquired by Hewlett-Packard Enterprise in January of 2020.

May 2017 - Jan 2020

Director Of Software Development

Prague, CZ

Jumpshot was acquired by Avast antivirus in September of 2013. With Avast behind us, we continued to grow the technology under the new brand "GrimeFighter" from Austin Texas. In a period of 18 months we grew from tens of thousands to millions of users. Since leaving this position the product has been re-branded again as Avast Cleanup.

Sep 2013 - Sep 2015

Founder And Cto Jumpshot, Acquired By Avast And Rebranded As Grimefighter

Jumpshot is a fully automated solution for solving PC frustration. Launch our app and enjoy an elegant interface and secure web surfing while we work our magic in the background. Our software is remarkable in three major ways:- A strong focus on user experience. Effortless to use, conversational feedback and a social game based on earning Karma. - Much.

Jul 2010 - Sep 2013

Creator

Openrce.Org

The Open Reverse Code Engineering (OpenRCE) community was created to foster a shared learning environment among researchers interested in the field of reverse engineering. OpenRCE aimed to serve as a centralized resource for reverse engineers (heavily win32/security/malcode biased) by hosting files, blogs, forums articles and more. The community has since.

Jun 2005 - Sep 2010

Founder

Austin, Texas, US

Designed, founded and launched the "Zero Day Initiative" (http://www.zerodayinitiative.com): a program for rewarding independent researchers for responsibly disclosing security vulnerabilities. This program has grown to be the largest and most successful of its kind. In the nearly 5 years I ran the program we unearthed and help patch over 1,100 critical.

Sep 2005 - Jun 2010

Assistant Director Of Idefense Labs

Idefense, Acquired By Verisign.

Oversaw and managed all operations concerning the company's Vulnerability Contributor Program (VCP) and all 1,000+ researchers. Managed daily responsibilities for team of 4 full-time security researchers. Verified known and discovered original vulnerabilities affecting a multitude of vendors, technologies, and platforms. Developed several tools to assist.

Sep 2002 - Sep 2005
2 education records

Pedram Amini education

Bs, Computer Science

Tulane University

Math, Computer Science

Stuyvesant High School
FAQ

Frequently asked questions about Pedram Amini

Quick answers generated from the profile data available on this page.

What company does Pedram Amini work for?

Pedram Amini works for OPSWAT.

What is Pedram Amini's role at OPSWAT?

Pedram Amini is listed as Founder, Hacker, Investor, Advisor | Chief Scientist OPSWAT at OPSWAT.

What is Pedram Amini's email address?

AeroLeads has found 2 work email signals at @inquest.net for Pedram Amini at OPSWAT.

What is Pedram Amini's phone number?

AeroLeads has found 7 phone signal(s) with area code 512, 202, 415, 281, 943, 800, 027 for Pedram Amini at OPSWAT.

Where is Pedram Amini based?

Pedram Amini is based in Austin, Texas, United States while working with OPSWAT.

What companies has Pedram Amini worked for?

Pedram Amini has worked for Opswat, Mozilla, Exodus Intelligence, Binarly, Inc., and Austin Hacker Hoedown.

How can I contact Pedram Amini?

You can use AeroLeads to view verified contact signals for Pedram Amini at OPSWAT, including work email, phone, and LinkedIn data when available.

What schools did Pedram Amini attend?

Pedram Amini holds Bs, Computer Science from Tulane University.

What skills is Pedram Amini known for?

Pedram Amini is listed with skills including Security Research, Computer Security, Reverse Engineering, Security, Vulnerability Assessment, Penetration Testing, Network Security, and Application Security.

Find 750M verified contacts

Search by job title, company, industry, location, and seniority. Export verified B2B contact data when you need it.