~/.about
hi! im peer.
i bet you’re wondering a bit about me and that’s why you’re here.
my hobbies include exploring creative ways to break things and learning some new things (sometimes computer related).
professional history
With close to a decade of professional experience, I have worked in various roles at several different companies. I began my career at Rapid7, where I held multiple positions and gained valuable experience. I then transitioned to a small Web Application Firewall startup, Signal Sciences, as a Security Engineer. In this role, I performed various security as a service roles and eventually focused on Security Research related to web-based attacks. After Signal Sciences was acquired by Fastly, I continued to grow my skill set and work on projects that extended beyond web-based attacks. Currently, I work at Tanium as a Product Security professional. In this role, I bring my experience and expertise to ensure the security organization.
Here are a couple n-day posts i (co)wrote back when i was working at Fastly.
- March 2021 - Exchange Vulnerabilities CVE-2021-26855, CVE-2021-26857, CVE-2021-27065
- September 2021 - Atlassian Confluence OGNL Injection CVE-2021-26084
- October 2021 - Apache HTTP Server vuln CVE-2021-41773
- October 2021 - Apache HTTP SSRF CVE-2021-40438
- December 2021 - Log4Shell CVE-2021-44228
- December 2021 - New data on Log4Shell CVE-2021-45046
- March 2022 - Spring4Shell CVE-2022-22963
feel free to drop me a line on keybase, email or twitter.