Pete Morgan work email
- Valid
- Valid
Pete Morgan personal email
- Valid
Pete Morgan phone numbers
I am a security researcher with a long history in research and consulting organizations tied to some of the smartest people imaginable. It has been the process of growing in this unique space that has developed an interesting combination of skills.I have an intense respect and appreciation for security research. As an individual contributor, I've audited systems, technologies, and software as targets for both customer and research projects. These projects regularly required the application of security research to a practical context, often in novel ways. Through constant practice, an all-star cast of mentors, and a near constant lack of sleep, I’ve developed a deep understanding of the intricacies of auditing complex systems for which no methodology exists. In leadership, I strive to enable a research-focused culture to encourage the exploration of new ideas. I’m always working to better communicate the technical merit, business impact, and nuanced value of the work my team creates. When I’m doing my job well, I’m a scientist, megaphone, linebacker, matador, coach, and entrepreneur.I’ve had the fortune of leading teams with an incredible group of people focused only on the most challenging of targets in a profitable manner. To be successful, I’ve had to learn a lot. Some highlights include abilities to:- sell research-oriented consulting engagements - scope a project to enable my team to succeed under business requirements while fitting a budget with limited information- present these mage-level researchers with new, increasingly difficult challenges- ensure work my team accomplishes reaches the proper audiences with commensurate magnitude- enable the research that contributes to the ethos of the teamSpecialties: Vulnerability research, reverse engineering, application security, network security, exploit dev, source code auditing, system design review, applied cryptography, threat modeling, tool dev, fuzzer dev
-
Vp Of ResearchHalcyonScottsdale, Az, Us -
Software Supply Chain Security ExpertPhylum 2023 - PresentEvergreen, Co, Us -
Cso And Co-FounderPhylum Apr 2020 - Oct 2023Evergreen, Co, UsPhylum is the open source software supply-chain security product protecting its customers from malware, vulnerabilities and supply chain attacks. Our entire company is composed of software developers and vulnerability researchers with over a decade of experience. This background enabled us to build a truly next-generation product to protect our customers from the growing number of attacks against open source software. -
Ceo/FounderClever Security Mar 2016 - PresentI founded Clever Security to be a boutique R+D company focused on challenging problems in computer security.
-
Vice President, Research And DevelopmentOptiv Inc Jul 2015 - Feb 2016Denver, Colorado, Us -
Vice President, Research And DevelopmentAccuvant Jun 2015 - Jul 2015Denver, Co, UsAccuvant joined with Fishnet Security to become Optiv Inc. -
Director, Applied ResearchAccuvant Inc Jan 2015 - Jun 2015
-
Practice Manager - Applied ResearchAccuvant Aug 2013 - Jan 2015Denver, Co, Us -
Principal Security Consultant At Accuvant LabsAccuvant Jun 2012 - Mar 2013Denver, Co, Us -
Security Researcher/ConsultantMatasano Security Sep 2009 - Jun 2012San Francisco, California, UsAs a security researcher in Matasano's Chicago consulting practice, I perform penetration testing services on a variety of engagements, including application, network, embedded device, and web application interfaces. In addition, I also specialize in external threat modeling, organizational security analysis, and network architecture design/review.Our methodology encompasses the use of reverse engineering, and code-assisted penetration testing techniques that allow a much more thorough analysis of the technology in question. -
Security EngineerSynercomm May 2009 - Aug 2009
-
Network Security EngineerCdw Berbee Nov 2006 - Apr 2009Madison, Wi, Us -
Information Security AnalystExceed Security Jan 2006 - Sep 2006Us -
Senior Lan ManagerManagement Information Office 2001 - 2006• Responsible for the department’s server farm and network (25+ servers and 3500 active nodes)• Researched, developed and instituted all security policies• Administrated all Windows, Novell, Linux, and Macintosh servers• Served as supervisor and project manager for the LAN team ( 6 members )• Served as security engineer and backup administrator• Served as a technical manager for the Residential Network (ResNet) operation• Acted as a technical liaison between central IT and MIO (residential computing)
Pete Morgan Skills
Pete Morgan Education Details
-
University Of Wisconsin OshkoshComputer Science / German -
Slinger High School
Frequently Asked Questions about Pete Morgan
What company does Pete Morgan work for?
Pete Morgan works for Halcyon
What is Pete Morgan's role at the current company?
Pete Morgan's current role is VP of Research.
What is Pete Morgan's email address?
Pete Morgan's email address is pe****@****ail.com
What is Pete Morgan's direct phone number?
Pete Morgan's direct phone number is +192020*****
What schools did Pete Morgan attend?
Pete Morgan attended University Of Wisconsin Oshkosh, Slinger High School.
What skills is Pete Morgan known for?
Pete Morgan has skills like Reverse Engineering, Application Security, Network Security, Penetration Testing, Computer Security, Cryptography, Vulnerability Research, Information Security, Web Application Security, Firewalls, Windows, Vulnerability Assessment.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial