N

Nick Gonella

Product Manager

San Francisco, California, United States11 yrs 3 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Expert in product security and vulnerability discovery.
  • Strong background in code auditing and threat modeling.
  • Passionate about binary analysis and reverse engineering.
Stackforce AI infers this person is a SaaS security expert with a focus on vulnerability management and product security.

Contact

Skills

Other Skills

ARM AssemblyBSDBurp SuiteCComputer ScienceCritical ThinkingElectronicsFlaskGitGoHTMLJIRAJavaJavaScriptLinux

About

Product Security Engineer Focus on code auditing, threat models, automatic vulnerability discovery Interests in binary analysis, reverse engineering, weird machines, operating systems, or any other excuse to learn a new system call

Experience

Harvey

2 roles

Product Security Lead

Promoted

Oct 2024Present · 1 yr 5 mos · San Francisco Bay Area

  • Paving the road for novel security solutions in the AI Application space.
  • Check out https://www.harvey.ai/blog/security-by-design to see how product security (and the rest of the team) ensures security is baked in the DNA of the product.

Senior Security Engineer

Feb 2024Oct 2024 · 8 mos · San Francisco Bay Area

  • Taking a product security function 0 -> 1, one commit at a time

Clear (clearme.com)

Senior Application Security Engineer

Aug 2023Jan 2024 · 5 mos · New York City Metropolitan Area · On-site

Amazon web services (aws)

2 roles

Senior Security Engineer

Jul 2023Jul 2023 · 0 mo · San Francisco Bay Area · Hybrid

AppSec Engineer

Jul 2021Jul 2023 · 2 yrs · San Francisco Bay Area · Hybrid

  • Worked with the AWS Console team to secure new features and maintain the
  • security of legacy systems. Helped develop threat models, pentest scoping, and
  • did pentest work with teams
  • Started an open source security group to maintain a consistent bar for open
  • source software produced by AWS
  • Coordinated and reviewed the security of dozens of services simultaneously to
  • ensure the Buy With Prime product's secure, timely launch
  • Performed penetration tests on new and existing AWS services
  • Built automated tooling to maintain baseline security controls for 100+ new
  • services being launched
  • Became SME for authentication, authorization, and front-end security within
  • team
  • Worked cross function with formal reasoning specialists to model
  • authentication and authorization properties of systems to identify
  • vulnerabilities
  • Authored guidance for entire AWS Security organization, as well as served as
  • one of the editors for the AWS security knowledge base
  • Mentored new security engineers through complex reviews

Bsidessf

Conference Organizer

Sep 2021Present · 4 yrs 6 mos · Hybrid

Workday

4 roles

Senior Associate Security Engineer

Aug 2019Jun 2021 · 1 yr 10 mos · Pleasanton, California, United States

  • Performed vulnerability research on customer facing and internal applications
  • Performed security audits and code review on business critical infrastructure
  • Performed network penetration testing against corporate and production systems
  • to find and remediate vulnerabilities
  • Performed Red Teaming exercises, involving evaluations of Workday from low or
  • non-privileged access
  • Authored novel malware frameworks and infrastructure to avoid SOC detections
  • Started the open sourcing program for Workday offensive security and
  • contributed the first tool
  • Co-maintainer and co-architecture of Workday's custom, scaling, automated SAST platform
  • Managed entire pentest lifecycle, including scoping, threat modeling,
  • developer interaction, and follow up, in addition to executing tests
  • Developed process and procedure for scaling security reviews, as well as
  • automation to aid with processes and procedures

Security Research Intern

Jun 2018Aug 2018 · 2 mos · Pleasanton, CA

  • Worked as a penetration tester on various internal and external applications, primarily web based
  • Helped develop SAST/DAST automation solutions to aid in security review scaling
  • Managed kickoff and wrapup meetings, as well as worked with development teams to remediate security vulnerabilities.

Security Research Intern

Jun 2017Sep 2017 · 3 mos · Pleasanton, California

  • Worked as a penetration tester on various internal and external applications, primarily web based.
  • Consulted and gave recommendations on improvement to cryptography systems being implemented by Workday.
  • Build custom penetration test automation tooling for security team

Security Research Intern

Jun 2016Jan 2017 · 7 mos · Pleasanton, CA

  • Worked as a penetration tester on various internal and external applications, primarily web based.
  • Wrote and deployed a Java-based LDAP/S library for developers.
  • Deployed Splunk dashboards for easier Tier 1 incident response.

California polytechnic state university-san luis obispo

3 roles

Teaching Associate

Jun 2018Jun 2019 · 1 yr

  • Instructor for CPE 357 (Systems Programming)
  • Instructor for CPE 453 (Intro To Operating Systems)
  • Instructor for CPE 213 (MATLAB for Engineers)

Tutor

Sep 2015Jun 2019 · 3 yrs 9 mos

  • • Tutored students on concepts including introductory programming, data structures, Java OOP, computer architecture, and systems programming

Teaching Assistant

Sep 2015Jun 2018 · 2 yrs 9 mos

  • TA for courses: Intro to Programming, Intro to Databases, Systems Programming, Network And Web Security, and Intro to Security
  • Wrote and maintained the automatic grading tools used by various professors
  • Helped professors develop security-oriented class material for Intro to Security courses

Spinpunch

Developer

Mar 2015Sep 2015 · 6 mos

  • Contributed to open source product Mattermost, the central platform for SpinPunch
  • Developed and maintained a ground up Go server
  • Developed and maintained a Flux-style React web app
  • Created CLI-style interface for shortcuts to key actions in Mattermost

Kaiser permanente

Researcher

Aug 2013Jan 2014 · 5 mos · San Rafael, California

  • Data mined the Kaiser patient database, forming and testing different hypothesizes using statistical analysis, and generating graphical information to convey said hypothesizes.
  • Published a paper which was accepted in the Society for Critical Care Medicine Journal. Presented findings at the annual congress

Education

California Polytechnic State University-San Luis Obispo

Master of Science - MS — Computer Science

Stackforce found 100+ more professionals with ARM Assembly & BSD

Explore similar profiles based on matching skills and experience