Patrick Toomey

Patrick Toomey Email and Phone Number

Principal Product Security Engineer at GitHub @ GitHub
88 Colin P Kelly Jr St, San Francisco, CA 94107, us
Patrick Toomey's Location
Atlanta, Georgia, United States, United States
About Patrick Toomey

My current position is as a staff engineer within product security engineering at GitHub. I have a strong passion for the application security space, including a particular interest in anything crypto related. I have extensive experience in assessing software security architecture, identification and exploitation of software vulnerabilities, and working with development teams to mitigate identified risks. Interests: Account security, Application security, Cryptography

Patrick Toomey's Current Company Details
GitHub

Github

View
Principal Product Security Engineer at GitHub
88 Colin P Kelly Jr St, San Francisco, CA 94107, us
Website:
github.com
Employees:
501
Patrick Toomey Work Experience Details
  • Github
    Principal Product Security Engineer
    Github Jun 2022 - Present
    San Francisco, Ca, Us
  • Github
    Staff Product Security Engineer
    Github Oct 2021 - Jun 2022
    San Francisco, Ca, Us
  • Github
    Director Of Product Security Engineering
    Github May 2020 - Oct 2021
    San Francisco, Ca, Us
  • Github
    Product Security Engineering Manager
    Github Jul 2016 - May 2020
    San Francisco, Ca, Us
  • Github
    Application Security Engineer
    Github Sep 2013 - Jul 2016
    San Francisco, Ca, Us
  • Google
    Information Security Engineer
    Google Jun 2012 - Sep 2013
    Mountain View, Ca, Us
    Protect the Goog by hardening libraries from common vulnerability classes, assessing software before it is released, and working with development teams to architect their projects securely.
  • Neohapsis
    Technical Lead For Application Security Consulting
    Neohapsis Jul 2009 - Jun 2012
    Chicago, Il, Us
    ● Promoted from Consultant to Senior Consultant to Technical Lead over the course of two and half years ● Performed hundreds of application security assessments and architecture reviews across a diverse set of software stacks (web based, compiled fat-clients, embedded systems) and languages (Java, C#, Ruby, Python, Objective-C, JavaScript, C, PHP, IA-32 assembly)● Initiated, designed, and developed an application to parallelize the collection of risk metrics across a large volume of web applications; this tool was used to help prioritize application assessments for clients and led to a new service offering● Developed software tools to automate assessments, demonstrate exploits, and foster research● Experience with reverse engineering/debugging binary applications and network protocols● Mentored/trained consultants to grow the team's application assessment capabilities
  • Neohapsis
    Senior Application Security Consultant
    Neohapsis Jun 2008 - Jul 2009
    Chicago, Il, Us
  • Neohapsis
    Application Security Consultant
    Neohapsis Jun 2007 - Jun 2008
    Chicago, Il, Us
  • Depaul University
    Adjunct Professor
    Depaul University Mar 2010 - Jun 2011
    Chicago, Il, Us
    ● Developed course material and delivered a quarter long course on application security, with a focus on performing application security assessments (web applications as well as binary applications)● By the end of the course students were able to identify/exploit common vulnerabilities in open source software, develop appropriate remediation/mitigation guidance for the vulnerabilities identified, and implement basic shellcode within a Linux environment
  • Motorola
    Senior Software Engineer
    Motorola Jun 2005 - Jun 2007
    Chicago, Illinois, Us
    ● Evaluated by supervisor as performing at a level commensurate with peers two grades more senior● Wrote security requirements for a secure boot mechanism as well as a protected debug facility for use on carrier grade infrastructure equipment; project involved balancing customer demands, product limitations, and negotiating customer buy-in● Developed a framework for testing Bluetooth behavior using the BlueZ Bluetooth stack● Performed a security evaluation on an internally hardened Linux/Java platform for mobile devices● Mentored an intern investigating susceptibility of ARM processors to cache based timing attacks; Leveraged C/Assembly for probing register/cache state, configuring page table entries, and writing test cases to exploit the timing variances● Initiated a research project in the area of embedded virtualization and domain isolation; 1/3 of the team was scheduled to be dedicated to this area in 2007-2008
  • National Security Agency
    Intern
    National Security Agency Jun 2004 - Aug 2004
    Ft. Meade, Md, Us
    ● Wrote a buffer overflow exploit for a known flaw in Apache to evaluate the efficacy of contemporary memory protections (stack canaries, ASLR, non-executable pages, etc.)● Wrote a patch to expand, as well as fix several flaws with, Snort’s handling of IPv6 traffic● Developed a lab of numerous Linux and Windows machines running in a virtualized environment to evaluate several of the leading open source honeypots such as Honeynet, Labrea, and Honeyd● Used tools such as Nessus, Metasploit, VMware, Wireshark, Nmap, and Snort to perform a penetration test of the lab environment in an effort to learn the functional features and shortcomings in the leading honeypot technologies● Analyzed the legal issues that surround honeypots, especially as it relates to the National Security Agency’s mission
  • Yjt Solutions
    Networking Consultant
    Yjt Solutions Jan 2002 - Apr 2003
    Chicago, Il, Us
    ● Deployed/Troubleshot Firewall Rules, Multicast, PGM, NAT, Routing, VLANs, HSRP, DNS, ISDN, Frame-Relay, SMTP, POP3, IMAP, ICA, router ACLs, and file/print services both internally and for clients● Developed in-house software tools used to diagnose, track, and catalog client networks using SNMP, WBEM/WMI, VBScript, and a MSSQL database● Architected and deployed networks for trading firms to provide connectivity to numerous vendor data feeds, branch offices, stock exchanges, and their associated trading floors● Developed the in-house customer database and GUI front-end (MS Access with extensive VBScript customization)

Patrick Toomey Skills

Application Security Security Computer Security Cryptography Information Security Web Application Security Python Network Security Linux Penetration Testing Code Review Mobile Security Java C Ruby Vulnerability Management Candy

Patrick Toomey Education Details

  • The Johns Hopkins University
    The Johns Hopkins University
    Computer Science
  • Purdue University
    Purdue University
    Electrical Engineering

Frequently Asked Questions about Patrick Toomey

What company does Patrick Toomey work for?

Patrick Toomey works for Github

What is Patrick Toomey's role at the current company?

Patrick Toomey's current role is Principal Product Security Engineer at GitHub.

What is Patrick Toomey's email address?

Patrick Toomey's email address is pt****@****sis.com

What is Patrick Toomey's direct phone number?

Patrick Toomey's direct phone number is +141544*****

What schools did Patrick Toomey attend?

Patrick Toomey attended The Johns Hopkins University, Purdue University.

What skills is Patrick Toomey known for?

Patrick Toomey has skills like Application Security, Security, Computer Security, Cryptography, Information Security, Web Application Security, Python, Network Security, Linux, Penetration Testing, Code Review, Mobile Security.

Who are Patrick Toomey's colleagues?

Patrick Toomey's colleagues are Sarath Babu M, Jan Koszewski, Joseph Katsioloudes, Destiny Ikpendieze, Nadia Goar, Ma, Claire Nguyen, April Leonard.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.