Rocco Calvi

Co-Founder

United States17 yrs experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over 270 CVEs related to remote code execution vulnerabilities.
  • Led vulnerability research for major tech companies.
  • Recognized for contributions to cybersecurity knowledge sharing.
Stackforce AI infers this person is a Cybersecurity Expert specializing in vulnerability research and software security.

Contact

Skills

Core Skills

Vulnerability ResearchCybersecurityResearch ManagementSoftware SecurityProject ManagementVulnerability DisclosureSecurity Management

Other Skills

0day researchBinary AnalysisCollaborative ResearchCybersecurity ConferencesEmbedded Systems SecurityExploit DevelopmentFuzzingIndustrial PartnershipsInnovation StrategyInternship ProgramsNegotiationPatch AnalysisPenetration TestingProblem SolvingRed Teaming

About

Rocco is a renowned cybersecurity researcher with deep expertise in source code review, coverage-guided fuzzing, and vulnerability assessment of web and binary applications. With over 13 years of experience, he has significantly advanced cybersecurity for government entities and private sector organizations worldwide, uncovering critical vulnerabilities, including high-impact remote code execution flaws in major products like Microsoft Office 2022 and widely deployed networking hardware. Currently, as Chief Vulnerability Researcher at TecSecurity Research, Rocco leads comprehensive security audits, identifying vulnerabilities through tailored assessments of software frameworks, web applications, and binary executables. His extensive background spans diverse technologies and sectors, earning recognition for his strategic approach and meticulous project management skills. Rocco has provided expert consultancy to prominent Global 1000 organizations such as Microsoft, Mayo Clinic, Nvidia, Meta, CrowdStrike, Amazon, Commonwealth Bank of Australia, and BAE Systems Applied Intelligence. He previously founded the Digital Security Research Centre at the Technology Innovation Institute in the UAE, driving efforts to automate source code auditing in collaboration with the University of Virginia's Cyber Grand Challenge team. His notable achievements include earning multiple first-place positions on Microsoft's Office Security Researcher Leaderboard (2022) and holding over 270 CVEs, primarily involving remote code execution vulnerabilities. Early in his career, Rocco secured first place at Panoply’s 2013 Security in Government Conference and second prize at Hackers for Charity’s international CTF competition. Committed to knowledge sharing, Rocco moderated Offensive Security’s Exploit-Database, led xen1thLabs’ Coordinated Disclosure Program, and contributed to Rapid7’s Metasploit Project, Corelan Team, and Trend Micro’s Zero Day Initiative. His responsible disclosure of critical vulnerabilities has been publicly acknowledged by Google, Microsoft, Adobe, IBM, NETGEAR, TP-LINK, AutoDesk, and VideoLAN.

Experience

Tecsecurity

Founder and Vulnerability Researcher

Nov 2021Present · 4 yrs 4 mos

  • As a senior member of TecSecurity, I specialize in advanced vulnerability research and comprehensive security assessments, with a strong emphasis on identifying critical zero-day vulnerabilities in high-value targets and widely-deployed software.
  • My core expertise includes conducting detailed source code reviews across various programming languages, including C, C++, C#, Java, Python, and Golang, complemented by sophisticated black-box assessments for web applications, mobile applications, binary products, hardware, IoT, and firmware. I am proficient in web hacking, mobile hacking, reverse engineering, binary exploitation, and actively develop and leverage advanced fuzzing techniques and custom security tools to uncover deep, impactful vulnerabilities.
  • In addition to technical research, I regularly craft exploits to demonstrate real-world impact, providing actionable insights and effective mitigation strategies to our clients. I closely collaborate with major technology companies, significantly contributing to their security through extensive submissions to their official bug bounty programs.
  • Beyond my technical responsibilities, I manage client relationships, produce detailed technical reports, and actively participate in hacking competitions to continuously refine my skills and stay at the forefront of cybersecurity research.
  • At TecSecurity, my mission is to deliver cutting-edge security solutions, proactively safeguarding our clients from sophisticated threats and ensuring the resilience and security of their critical systems.
Innovation StrategyBinary AnalysisStatic Analysis0day researchPatch AnalysisFuzzing+6

Technology innovation institute

Founder and Acting Chief Researcher of Digital Security Research Centre

Nov 2020Nov 2021 · 1 yr

  • As the acting Chief Research Officer for the Digital Security Research Centre at TII, I played a key role in building the Institute's advanced capability for automatically analyzing software, identifying security flaws, evaluating security defects, and correcting them accordingly. My responsibilities included creating and pitching the original roadmap, hiring 20 security researchers, dealing with vendor MOUs, establishing world-recognized partnerships, overseeing the engineering of our solution, and managing marketing events.
  • In addition to these responsibilities, I also wrote an article that was featured at Blackhat USA 2021 and provided monthly upper management presentations. My work at TII allowed me to utilize my expertise in cybersecurity to drive the growth and success of the company, and I am proud of the contributions I made during my time there.
Team BuildingVulnerability AnalysisIndustrial PartnershipsVisionary LeadershipCybersecurity ConferencesNegotiation+6

Digital14

Director of Software Lab

Jan 2020Nov 2020 · 10 mos · United Arab Emirates

  • As the Director of Software Lab at Digital14, I was responsible for managing the functions of the lab, including staff, requirements, and projects. I oversaw all software security assessments and worked intensely on critical and special projects, examining R&D proposals as a committee member and coaching colleagues on advanced cybersecurity topics.
  • In addition to these responsibilities, I also expanded the partner bench, reviewed and influenced legal binding documents, prepared and presented several proposals to leadership, participated in planning content, reconciled budgets, initiated and observed the file format fuzzing initiative, collaborated alongside the Hardware, Crypto, and Signal labs, defined the team's KPIs and measured their performance, sourced top talent for critical projects, and managed all software testing for the organization's secure communication products. I also supervised and reviewed the Android guided fuzzing program, helping clients address challenges to meet deadlines. Overall, my work at Digital14 allowed me to utilize my expertise in software development and cybersecurity to drive the success of the organization.
Vulnerability AnalysisReverse EngineeringSecure Coding PracticesPenetration TestingTest Lab ManagementSoftware Security+1

Xen1thlabs

2 roles

Director of Software Lab

Promoted

Apr 2018Jan 2020 · 1 yr 9 mos

  • As the Director of Software Lab at xen1thLab, I was responsible for initiating and leading the vulnerability disclosure program, serving as the key representative in the company's films, and directing a technical team consisting of over ten security researchers and eight contractors. My duties included managing meetings and day-to-day operations, introducing cutting-edge test and validation software capabilities, influencing the company's security improvement program, marketing xen1thLabs and the company at security conferences, nurturing client relationships, presenting at leadership events, and supervising multiple automation initiatives.
  • In addition to these responsibilities, I also coordinated over 100 security assessments, attained ISO 17025 for the Software Lab, managed classified projects, improved and streamlined testing procedures, developed individual personal development plans, prepared, presented, and defended several strategic initiatives, and handled resource forecasting, allocation, and prioritization. I was also fortunate to present at the Mobile World Congress 2017, which was a great opportunity to share my knowledge and expertise with a larger audience. Overall, my role at xen1thLab allowed me to utilize my skills and experience in software development and cybersecurity to drive the success of the organization.
Reverse EngineeringRed TeamingWeb Application SecurityVulnerability DisclosureSecurity Management

Lead Security Researcher

Apr 2016Apr 2018 · 2 yrs

  • As a Lead Security Researcher at xen1thLab, I was selected to discover zero-day vulnerabilities, deliver critical and special projects, build stakeholders' trust, develop business cases, and provide security reports. In this role, I was responsible for using my expertise in cybersecurity to identify and research vulnerabilities, and to provide insights and recommendations to clients and stakeholders.
  • In addition to these technical responsibilities, I also supported management-related work, such as holding job interviews, writing reports and statements of work, scoping projects, and actively contributing to project management. My role at xen1thLab allowed me to utilize my skills and experience in cybersecurity to drive the success of the organization and to build trust with our clients and stakeholders.

Ioactive, inc.

Lead Security Consultant Contractor

Oct 2014Jan 2016 · 1 yr 3 mos

  • As a Lead Security Consultant Contractor at IOActive, I worked on a wide range of projects and initiatives to help clients improve their cybersecurity posture. One of my most notable projects was at a world-class and renowned medical clinic, where I conducted reverse engineering and security exploitation for new-to-market medical devices. This work was essential in helping the clinic ensure the security and safety of their patients and their data.
  • In addition to this project, I also collaborated with the Microsoft attack team, focusing on Microsoft Azure projects and services and working with the Microsoft Code Signing team. My role at IOActive allowed me to utilize my expertise in cybersecurity and reverse engineering to help clients secure their systems and protect against potential threats.

Securus global

Senior Security Consultant

Jun 2014Oct 2014 · 4 mos · Melbourne Area, Australia

  • As a Senior Security Consultant at Securus Global, I was responsible for conducting security penetration testing projects for several high-profile applications. My work involved identifying and researching vulnerabilities, and providing recommendations to clients on how to improve their security posture. I also worked to improve client understanding of their security requirements and assisted in the overall perimeter defense.
  • In addition to these responsibilities, I developed advanced scripting tools to demonstrate critical security findings and improve existing documentation, and assisted colleagues with improving testing methodologies. My role at Securus Global allowed me to utilize my expertise in cybersecurity and penetration testing to help clients secure their systems and protect against potential threats.

Bae systems applied intelligence

Senior Security Consultant

Aug 2010Jun 2014 · 3 yrs 10 mos

  • As a Senior Security Consultant at BAE Systems Applied Intelligence, I was responsible for advising clients on security testing requirements and conducting security analysis and testing, reporting on findings, and working across a variety of industry sectors. These sectors included government, financial institutions, manufacturing, energy and utilities, and telecommunications.
  • In addition to these responsibilities, I also performed project management on complex projects with specialized resources, trained junior consultants, presented in-house presentations and knowledge sharing sessions to upskill colleagues, served as the Subject Matter Expert for infrastructure and application security testing, advised and coached colleagues with peer and tech reviews for reports, and presented at corporate events and conferences. My role at BAE Systems allowed me to utilize my expertise in cybersecurity and project management to help clients improve their security posture and protect against potential threats.

Corelan team

Security Researcher and Exploit Developer

Jan 2009Jan 2011 · 2 yrs · https://www.corelan.be/index.php/about-us/about-corelan-team/

  • As a Security Vulnerability Researcher at Corelan Team, I was responsible for identifying and researching critical vulnerabilities in Windows binary applications. My work involved using my expertise in exploitation techniques to uncover and report on vulnerabilities, and I was able to accomplish numerous capture the flag events as a result of my efforts.
  • In addition to these responsibilities, I also developed several Metasploit Project exploits, assessed technical blog posts, and gained recognition for developing various reliable exploits. My role at Corelan Team allowed me to utilize my skills and experience in cybersecurity and vulnerability research to make a positive impact in the field.

Education

Swinburne University of Technology

Bachelor’s Degree — Information Technology & Information Systems

Stackforce found 100+ more professionals with Vulnerability Research & Cybersecurity

Explore similar profiles based on matching skills and experience