D

Douglas McKee

Director of Engineering

Dallas, Texas, United States16 yrs 10 mos experience

Key Highlights

  • Director of Vulnerability Intelligence at Rapid7.
  • Frequent speaker at top security conferences.
  • Recognized for discovering numerous CVEs.
Stackforce AI infers this person is a Cybersecurity expert specializing in vulnerability research and incident response.

Contact

Skills

Core Skills

Cybersecurity StrategyIncident ResponseOffensive SecurityMalware Analysis

Other Skills

Vulnerability IntelligenceThreat ResponseCross-functional CollaborationVulnerability DisclosureThreat AnalysisVulnerability ManagementVulnerability ResearchPublic DisclosureProduct Security AssessmentsPenetration TestingExploit WritingCybersecurity ResearchThreat MitigationTeam LeadershipReverse Engineering

About

An experienced information security professional possesses extensive technical expertise acquired through involvement in application and system security testing, hardware and software vulnerability research, malware analysis, forensics, penetration testing, red team exercises, protocol analysis, application development, and risk mitigation activities. These technical proficiencies are complemented by adept leadership and communication skills, honed through the leadership of teams and projects, collaboration within both large and small teams, and the composition of technical reports for clients. Douglas stands recognized for the discovery of numerous CVEs and regularly serves as a speaker at prominent security conferences such as Blackhat, DEFCON, RSA, Hardware.io, and Ekoparty. Additionally, Douglas's research is frequently featured in publications with a wide readership, including Wired, Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios. Expertise in diverse domains, including: ❏ Leadership: Known for fostering team growth and promoting collaboration. ❏ Communication: Strong communication skills for effective team dynamics. ❏ Problem-Solving: Highly adept at critical thinking and issue resolution. ❏ Offensive Security: Proficient in vulnerability research and penetration testing. ❏ Threat Analysis: Demonstrated capabilities in comprehensive threat assessment. ❏ Cybersecurity Strategy: Proven track record of strategic security planning. ❏ Malware Analysis: Well-versed in advanced malware examination techniques. ❏ Incident Response: Skilled in effective incident handling and mitigation. ❏ Risk Management: Expertise in identifying and managing security risks. https://linktr.ee/fulmetalpackets

Experience

16 yrs 10 mos
Total Experience
3 yrs 3 mos
Average Tenure
7 mos
Current Experience

Rapid7

Director of Vulnerability Intellegence

Oct 2025Present · 7 mos · Remote

  • As Director of Vulnerability Intelligence at Rapid7, I lead a world-class research organization dedicated to understanding, prioritizing, and communicating the vulnerabilities and attack vectors that matter most to global defenders. I set the strategic vision for Rapid7’s vulnerability intelligence capabilities and guide the initiatives that transform cutting-edge research into real-world impact for customers, partners, and the broader security community.
  • I oversee Rapid7’s Emergent Threat Response (ETR) program—driving cross-functional collaboration to deliver timely, actionable intelligence during widespread attacks—and I lead our Coordinated Vulnerability Disclosure (CVD) program, ensuring our zero-day research, vendor coordination, and public disclosures reflect the highest standards of rigor, transparency, and impact.
  • My role blends strategic leadership with hands-on operational engagement. I manage and scale a globally distributed team of researchers and analysts; champion our findings to technical and non-technical audiences; and strengthen the relationships, processes, and collaboration models that enable Rapid7 Labs to stay ahead of an evolving threat landscape.
  • Throughout this work, my mission is consistent: elevate vulnerability intelligence from reactive insight to proactive foresight—helping organizations worldwide understand what’s important, what’s not, and why, so they can make confident decisions in the moments that matter most.
Vulnerability IntelligenceThreat ResponseCross-functional CollaborationVulnerability DisclosureCybersecurity StrategyIncident Response

Rapid risk radar

Executive Advisor

Aug 2025Present · 9 mos · Remote

Cyberplayback

Advisory Board Member

May 2024Present · 2 yrs

Sonicwall

Executive Director of Threat Research

Sep 2023Oct 2025 · 2 yrs 1 mo · Dallas, Texas, United States · Remote

  • Lead cutting-edge research efforts in identifying and mitigating cybersecurity vulnerabilities. Accountabilities include overseeing a global team of highly skilled researchers and collaborating with cross-functional teams to stay ahead of emerging threats, playing a crucial role in ensuring our customers' protection.

Sans institute

Author and Instructor

Apr 2022Present · 4 yrs 1 mo

  • Served as the primary author and instructor for SANS SEC568, specializing in product security assessments.
  • Deliver advanced penetration testing and exploit writing training as an instructor for SANS 660.
  • Develop comprehensive course materials that enhanced student engagement and understanding of complex security concepts.
Product Security AssessmentsPenetration TestingExploit WritingCybersecurity StrategyOffensive Security

Trellix

Principal Engineer & Director of Vulnerability Research

Feb 2022Jul 2023 · 1 yr 5 mos · Plano, Texas, United States · Hybrid

  • (Previously McAfee) As the Director of Vulnerability research, I run a global team of truly world-class security researchers, with expertise mainly in reverse engineering and exploit development focusing on both zero-day and n day analysis. The team's research spans nearly every industry and is often found in top-tier publications and industry conferences. I spend a large amount of time interfacing with media, customers and vendors throughout the vulnerability disclosure process. I additionally run and manage a global Red Team which is responsible for running threat emulation and simulation according to the MITRE framework against Trellix products. As a Principal Engineer in this role, I continue to mentor and perform highly technical vulnerability research on both hardware and software targets followed by responsible disclosure.
  • Trellix is the result of a merger of McAfee Enterprise and Fireeye
Cybersecurity ResearchThreat MitigationTeam LeadershipCybersecurity StrategyIncident Response

Mcafee enterprise

3 roles

Principal Engineer & Lead Security Researcher

Promoted

Feb 2020Mar 2022 · 2 yrs 1 mo

  • McAfee Principal Engineer and team lead for the Advanced Threat Research (ATR) vulnerability research team. Primary responsibilities include leading the team's research direction, mentoring junior researchers, speaking at conferences, and performing zero-day vulnerability research on both hardware and software platforms followed by responsible disclosure.
Vulnerability ResearchReverse EngineeringExploit DevelopmentOffensive SecurityCybersecurity Strategy

Sr. Security Researcher

Promoted

Jun 2017Feb 2020 · 2 yrs 8 mos

  • Member of the Advanced Threat Research (ATR) team in the office of the CTO. Primary responsibilities include researching new security vulnerabilities on both hardware and software platforms followed by responsible disclosure.
Vulnerability ResearchMentoringConference SpeakingOffensive SecurityCybersecurity Strategy

Sr. Malware Analysis Engineer and Developer

Jul 2015Jun 2017 · 1 yr 11 mos

  • Performing research and development to aid in the advancement of McAfee's malware detection and prevention tools. Research requires reverse engineering, application penetration testing and big data analysis. Development tasks were done largely in C, C++ and Python.
Researching VulnerabilitiesResponsible DisclosureOffensive Security

Protiviti

Senior Consultant

Sep 2014Jul 2015 · 10 mos · Dallas/Fort Worth Area

  • Technical Lead for the Dallas Cyber Security Lab. Responsibilities include preforming the following tasks:
  • Internal and External Penetration Assessments
  • Wireless Security Assessments
  • Social Engineering Assessments
  • Web Application Penetration Tests
  • Vulnerability Assessments
  • System Administration of Lab network
  • Writing Technical Reports for clients
Malware DetectionReverse EngineeringApplication Penetration TestingMalware Analysis

United states department of defense

Security Engineer

May 2009Sep 2014 · 5 yrs 4 mos

  • Perform security assessments, penetration testing, reverse engineer network protocols, network and file fuzzing, malware analysis, C/C++ development, risk mitigations, system hardening for Linux, Unix and Windows, and security research.
Penetration AssessmentsVulnerability AssessmentsTechnical ReportingCybersecurity Strategy

Education

East Stroudsburg University of Pennsylvania

Master's degree — Computer and Information Systems Security/Information Assurance

Jan 2010Jan 2011

East Stroudsburg University of Pennsylvania

Bachelor's degree — Computer Security

Jan 2006Jan 2010

East Stroudsburg University of Pennsylvania

Bachelor's degree — Computer Science

Jan 2006Jan 2010

Stackforce found 100+ more professionals with Cybersecurity Strategy & Incident Response

Explore similar profiles based on matching skills and experience