Wil R.

CEO

United States20 yrs 2 mos experience
Most Likely To SwitchAI ML Practitioner

Key Highlights

  • Built an AI-powered security platform from scratch.
  • Led red teams and managed vulnerability programs for Fortune 500 companies.
  • Reduced mean time to remediation by over 70%.
Stackforce AI infers this person is a Cybersecurity expert with a focus on AI-driven solutions for enterprise security.

Contact

Skills

Core Skills

AiCybersecurityDevsecopsCloud SecuritySecurity ArchitectureSecurity OperationsInformation SecurityComplianceAuditingNetwork SecurityIt SecurityIncident ResponseInformation Technology

Other Skills

AI-powered security automationcloud-native security solutionsautomation pipelinesAI/ML for threat detectionproduct strategyautomationcloud-native solutionscloud agnostic solutionsopen source toolsCI/CD Securitycloud security assessmentssecurity architecturescloud-based applicationssecure software developmentapplication security

About

Your last pentest report was already obsolete when it landed on your desk. I spent 20 years inside Fortune 500 security programs — JPMorgan Chase, Nike, Ernst & Young, Comcast, NBCU, Wolters Kluwer — watching this cycle repeat. Run a pentest once a year. Get a 200-page report. Spend months chasing false positives. By the time you fix the real ones, new vulnerabilities have already replaced them. That is a 364-day blind spot. And it is the gap most breaches walk through. I got tired of fighting a broken model. So I built Agent Bounty. Agent Bounty is an end-to-end AI-powered Continuous Threat Exposure Management platform. Autonomous AI agents that attack your infrastructure the way real adversaries do — continuously. Every finding is validated through actual exploit verification, so you never chase a false positive again. When a real threat is confirmed, it generates production-ready fixes — code patches, pull requests, Terraform updates — ready for your one-click approval. - No more annual pentests that are stale on arrival. - No more alert fatigue burying your team. - No more 60-day remediation backlogs. Continuous testing across your entire attack surface — multi-cloud, Kubernetes, APIs, applications, supply chain — with automated remediation and a single dashboard that replaces chaos with clarity. I built this from the same trenches your security team is fighting in right now. I have led red teams, built SOAR platforms, reduced MTTR by 70%+, and managed vulnerability programs covering a million-plus assets. Military veteran with previous TOP-level clearances. If you are scaling fast, chasing SOC 2, and don’t have a 20-person security team — this is what I built for you.

Experience

20 yrs 2 mos
Total Experience
2 yrs 8 mos
Average Tenure
9 yrs 7 mos
Current Experience

Agent bounty

CEO & Founder

Jul 2025Present · 10 mos · Los Angeles, California, United States · Remote

  • Founded and built Agent Bounty from the ground up—architecting the platform, writing core code, and leading product vision. Hands-on development of AI-powered security automation tools that help enterprises detect and remediate vulnerabilities at scale.
  • Designed and implemented the technical architecture for cloud-native security solutions
  • Built automation pipelines integrating AI/ML for threat detection and response
  • Lead a cross-functional team while maintaining active contributions to the codebase
  • Driving product strategy at the intersection of AI, cybersecurity, and DevSecOps
AI-powered security automationcloud-native security solutionsautomation pipelinesAI/ML for threat detectionproduct strategyAI+1

Confidential company

Lead DevSecOps & AI Security Engineer

Oct 2016Present · 9 yrs 7 mos · Denmark · Remote

  • DevSecOps practices with a focus on cloud agnostic solutions using open source tools such as Terraform, Ansible, Packer and Vagrant
  • CI/CD Security
  • Azure DevOps
  • IaC Scanning
  • Docker Image hardening and Security
  • Cloud Greenfield projects (AWS, Azure, GCP)
  • Cloud Development (migrate apps to the cloud, leveraging cloud-native services)
  • Cloud security and privacy assessments, pen testing, complete initial setup of Policies, AD Federation, Roles etc.
  • Mobile application testing & hardening recommendations
  • API Management (security, rate limiting etc)
  • Threat Intelligence/Hunting and Incident Response experience using open source frameworks such as Buscador/OSINT, SANS SIFT, FireEye FLARE, and Enterprise Tools such as Recorded Future, Crowdstrike Falcon, Cyberproof Intsights, Orca, Sentinel, Mitre Attack Framework DevOps Implementation
DevSecOpscloud agnostic solutionsopen source toolsCI/CD Securitycloud security assessmentsCloud Security

Nike

Senior Cybersecurity Analyst

Jul 2014Oct 2014 · 3 mos · Portland, Oregon Metropolitan Area

  • Senior Cyber Security Analyst that provides cutting edge, innovative, and thoroughly-vetted finished intelligence products, including high-quality papers, briefings, recommendations, and findings to senior-level decision makers and executive management. Work a rotating schedule that includes night shift to support 24/7 a week environment model at Nikes Secure Operations Center (SOC). Leverage knowledge of industry best practices, good judgment, and problem solving skills to execute security operations. Use Splunk and FireEye CMS, among other tools for security response to triage security issues. Respond to alerts and make good decisions under pressure and quickly adapting to any security challenge.
intelligence productssecurity operationsincident responseCybersecuritySecurity Operations

Infogroup northwest

Senior Security Compliance Consultant

Apr 2014Jul 2014 · 3 mos · Portland, Oregon Area

  • Security Analyst position in the Information Risk and Compliance department at Portland General Electric (PGE). Responsible for the assurance and protection of organizational information assets. This position assesses complex IT systems, develops remediation plans, and recommends and implements processes improvements to Information Security Program efforts.
information riskcomplianceremediation plansInformation SecurityCompliance

Secureworks

Senior Security Consultant

Nov 2013Sep 2016 · 2 yrs 10 mos · Anywhere, USA

  • Responsible for the design and development of innovative security architectures for protecting data deployed into customers cloud. Consulted on security vision and strategy around cloud-based applications, across all types (Infrastructure, Platform, and Software).
  • In charge of assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes (secure software development, application security, data protection, cryptography, key management, identity and access management, network security) within SaaS, IaaS, PaaS in cloud environments.
  • A strong security posture in direct interaction with (Devops team) deployment orchestration, automation, and security configuration management (Jenkins, Salt, Terraform).
  • Develop threat model for specific subscription (Azure), accounts (AWS)
security architecturescloud-based applicationssecure software developmentapplication securitySecurity ArchitectureCloud Security

Variq

Senior Security Consultant

Nov 2010Feb 2012 · 1 yr 3 mos · Washington DC-Baltimore Area

  • Provided Information Assurance (IA) analysis and certification and accreditation (C&A) expertise to IRS Safeguards Program. Reviewed security requirements, products, configurations, and IA architectures necessary to ensure the government and vendor's security architecture and associated accreditation documentation meets Internal Revenue Service requirements. Provided advice and recommended direction on IA and C&A matters. Provided programmatic support in a dynamic and challenging environment. Participated and collaborated in team meetings to coach program managers and IA practitioners through certification and compliance processes, and track critical IA processes and elements through use of automated and semi-automated tools. Maintained the accurate, steady, and consistent flow of information in response to client direction through established processes. Enhanced existing IA doctrine and processes through application of project management skills. Served as primary action officer or project management liaison as necessary.
Information Assurancesecurity requirementscertification and accreditationInformation SecurityCompliance

Ey

Senior Security Auditor

Dec 2005Apr 2010 · 4 yrs 4 mos · New York City Metropolitan Area

  • Member of the Policy and Compliance group with the firm’s Global Information Security department. This position encompasses multidisciplinary skills such as Project management, Auditing, and Network security analysis. Developed within a multitasking environment were the ability to communicate effectively and influence IT leadership, staff, and stakeholders within the Global community to implement security recommendations and embrace the compliance framework. The ‘Code of Connection’ is the firms approach to ISO 17799, sets a baseline for security policy guidelines and standards for secure applications and services worldwide. The Code of connection is dynamic in nature and will evolve with the technologies and changes the firm will engage in the next years. These regulatory cannon is of worldwide application therefore the need to develop and maintain strong, collaborative relationships with all levels of technical and Non-technical peers in Ernst & Young and the Global partners worldwide is a must. Code of Connection designated 12 countries to be audited, discovery, data collection, interviewing, analysis, reporting, remediation and telecommunications hosting are of direct responsibility and within the positions range of accountability. The position required previous systems and security architecture as well as a high level of adaptability and technologies comprehension to understand and develop an efficient methodology for the audits. Create internal guidelines using NIST’s publications and oversee the proper implementation.
auditingnetwork security analysissecurity recommendationsAuditingNetwork Security

Pwc

Information Security Technical Officer

May 2005Sep 2005 · 4 mos · Anywhere, USA

  • Responsible for providing IT Security Advisory and Accreditation services to ensure that the firm’s internal IT infrastructures, applications and services are compliant with PwC’s global IT Security policies and standards and industry best practices. In addition to performing IT Security Risk Analysis reviews for existing PwC applications, the ISTO will be responsible for conducting RA analyses for IT projects prior to implementation. The ISTO will also be required to respond to day-to-day enquiries and activities. The role necessitates an ability to communicate effectively and influence IT leadership, staff and other stakeholders within the South and Central America region’s territories to implement security recommendations. The ISTO will also engage with the business on a range of information security areas including security policies & standards and security awareness. Consult territories on all security matters including Firewall configuration (Checkpoint/Cisco PIX) and VPN implementation.
IT Security Advisoryrisk analysissecurity policiesIT SecurityCompliance

Kforce technical staffing

Network Security Engineer

Oct 2004May 2005 · 7 mos · Greater Atlanta Area

  • Coordinate with vendor contacts to research and evaluate new technologies, recommend new projects to management and implement those which are purchased, and review/maintain firewall policy and logs. Maintain security policy, work with management in multiple departments to balance security goals with functional requirements, and document current security policies and procedures and make recommendations to management for changes where appropriate. Additional responsibilities include coordinating Incident Response efforts during virus / worm outbreaks, reviewing the security posture of current network architecture, systems, and applications, and making recommendations to management when appropriate and implement approved changes. Duties also include responding to second-tier user support requests when necessary and other duties as assigned. Ability to assume duties of clients Information Security Officer outlined in board of Director's Security Policy.
security policyincident responsefirewall policyNetwork SecurityIncident Response

Jpmorgan chase & co.

Information Security Administrator

Aug 2001Sep 2004 · 3 yrs 1 mo · New York City Metropolitan Area

  • Accountable for managing, enhancing and supporting outsourced security operations for JPMorganChase client. Team member of 10 accountable for administering security procedures on client’s multi-platform environment, consisting of more than 96 applications, including Windows NT, Novell NetWare and AS/400 platforms. Manage and monitor internal security for more than 14,000 users across WAN. Administer and monitor security infrastructure for Novell NetWare and Lotus Notes systems. Introduce new processes, procedures and technologies to reduce vulnerability. Accountable for overall success of assigned projects, from initial needs assessments and design through implementation, configuration and customer satisfaction. Direct all aspects of projects, including project planning, scheduling and tracking. Manage risk assessment, issue resolution and change management initiatives. Facilitate internal and external audits to identify vulnerability and risks, and implement additional controls. Evaluate security features of new software to ensure compliance with access control policies, prior to deployment into environment. Perform user access certifications to ensure compliancy with internal IT Control Policies and government regulations. Train new Security Administrators on technologies and procedures. Was originally brought in as a Consultant and hired within 2 months.
technical infrastructureuser supportInformation Technology

Us navy reserve

Information Systems Technician

Dec 2000Mar 2005 · 4 yrs 3 mos · Washington D.C. Metro Area

  • Responsible for administering, optimizing and enhancing technical infrastructure to optimally provide support to users throughout Kingsbay and Bethesda bases. Team member of 20 accountable for supporting and upgraded LAN/WAN infrastructure consisting of Windows NT/2000 servers and desktops. Manage user accounts in Active Directory, Exchange 2000 and SIPRNET networks. Perform security maintenance on local PDC. Analyze and resolve hardware, software and networking issues.
security proceduresuser access certificationsSecurity Operations

Education

Saint Leo University

Jan 2007Jan 2009

Cisco Networking Academy

Cisco Enterprise Networking

Jan 2003Jan 2004

Stackforce found 100+ more professionals with Ai & Cybersecurity

Explore similar profiles based on matching skills and experience