Paul Asadoorian

Co-Founder

Coventry, Rhode Island, United States26 yrs experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Founder of the Security Weekly podcast network
  • Expert in firmware and supply chain security
  • Extensive experience in penetration testing
Stackforce AI infers this person is a Cybersecurity expert with a strong focus on firmware and vulnerability management.

Contact

Skills

Core Skills

Firmware SecurityVulnerability ManagementContent CreationSecurity ConsultingPenetration TestingVulnerability AnalysisProduct DevelopmentMetasploitIntrusion Detection

Other Skills

Supply Chain SecurityVulnerability DisclosureSystems AdministrationPodcastingEthical HackingCustomer ServiceProduct StrategyNessusVPNCisco TechnologiesPublic SpeakingSecurity AuditsDisaster RecoveryEncryptionGCIH

About

Paul Asadoorian spent time “in the trenches” implementing security programs for a lottery company and then a large university. Paul is offensive, having spent several years as a penetration tester. He is the founder of the Security Weekly podcast network, offering freely available shows on the topics of information security and hacking. As Product Evangelist for Tenable Network Security, Paul built a library of materials on the topic of vulnerability management. When not hacking together embedded systems (or just plain hacking them) or coding silly projects in Python, Paul can be found researching his next set of headphones.

Experience

Eclypsium, inc.

2 roles

Principal Security Researcher

Promoted

Oct 2024Present · 1 yr 5 mos

  • Working closely with researchers and developers in the areas of firmware, UEFI, and supply chain security, specifically:
  • Discover new security research and published vulnerabilities and assist in both marketing and R&D efforts
  • Drive new product features based on existing public research and conduct my own independent research projects
  • Prototype new security research projects in the areas of firmware and supply chain security
  • Work closely with the research team on vulnerability disclosure
  • Continue assisting marketing efforts, including blogs, podcasts, and social media
Firmware SecuritySupply Chain SecurityVulnerability DisclosureVulnerability Management

Firmware Security Evangelist

Jun 2022Oct 2024 · 2 yrs 4 mos

  • Working to make the world safer from firmware security threats.
Firmware Security

Cyberrisk alliance

Chief Innovation Officer

Sep 2020May 2022 · 1 yr 8 mos · Warwick, Rhode Island, United States

  • Helping innovate all things security and hacking...
Product DevelopmentCustomer Service

Security weekly productions

2 roles

Founder & CTO

Nov 2018Present · 7 yrs 4 mos · Warwick, RI

  • My role is to lead the team to create the best and most engaging content for the security community. I am also responsible to lead the development efforts of our internal production software, systems administration, advising companies security teams and conducting analyst briefings with the security industry. I am currently the primary host for Hack Naked News, Paul's Security Weekly and Enterprise Security Weekly shows on our network.
Content CreationSystems AdministrationSecurity Consulting

Founder & CEO

Jun 2004Nov 2018 · 14 yrs 5 mos · Warwick, RI

  • We provide security information to the community in the form of podcasts, webcasts, and Internet TV. Our professional services include penetration testing, vulnerability analysis, ethical hacking, and embedded device testing. Listen to Security Weekly (https://securityweekly.com) for more information.
Penetration TestingVulnerability AnalysisEthical Hacking

Offensive countermeasures, llc

Strategic Advisor

Mar 2016Oct 2024 · 8 yrs 7 mos · Warwick, RI

  • Offensive Countermeasures was founded by John Strand and Paul Asadoorian. We’re excited to be researching and developing new and cutting edge products. Not only are you purchasing great products, you’re also getting the expertise and customer service that make us awesome.
  • Have you been notified of a breach by a third party or discovered a breach present in your network that persisted for over 200 days? Then you know the feeling of being violated. What if you could discover the breaches in your network before they were able to do any damage? Offensive CounterMeasures’s products allow you to do just that. Based on years of research from leaders in the security community, this patent-pending technology puts a 24/7 security ninja in your network, ready to alert you to the compromises before they become headlines.
Product DevelopmentCustomer Service

Tenable network security

2 roles

Product Strategist

Promoted

Jan 2015Feb 2016 · 1 yr 1 mo

  • Researching, analyzing, [insert lots of other verbs here] in the vulnerability management/scanning product space.

Product Evangelist

Mar 2009Jan 2015 · 5 yrs 10 mos

  • Hail Nessus!
Vulnerability ManagementProduct Strategy

Oshean, inc.

Senior Network Security Engineer

Apr 2007Jul 2008 · 1 yr 3 mos

  • Responsible for Penetration Testing, Intrusion Detection, Firewalls, and Vulnerability Assessments.

The sans institute

Instructor

Jan 2007Jan 2008 · 1 yr

  • Taught classes in Metasploit, also teach the Advanced Nessus Training course
Penetration TestingIntrusion Detection

Gtech

Internet Security Engineer

Feb 2001Jul 2001 · 5 mos

  • Deployed Intrusion Detection systems worldwide
  • Assisted in deployment and administration of both client and site VPN
  • Ported Perl based DNS web/database application to FreeBSD
  • Assisted in configuration of Cisco routers, firewalls, and switches

Brown university

Lead IT Security Specialist

Jan 2001Jan 2007 · 6 yrs

MetasploitNessus

Uwin!

Lead Unix Systems administrator

Apr 2000Feb 2001 · 10 mos

  • Provided leadership for a team of 4 Unix/NT administrators
  • Built multiple Solaris environments (including web, application, & database servers)
  • Maintained Checkpoint/Nokia firewalls, including preparation for a security audit
  • Implemented security in all areas (Software, Network, Physical)
  • Developed various pieces of the application using Perl, bash, and C
Intrusion DetectionVPNCisco Technologies

Education

Bryant University

HS — Computing & Information Systems

Jan 1995Jan 1999

Stackforce found 100+ more professionals with Firmware Security & Vulnerability Management

Explore similar profiles based on matching skills and experience