"Specializing in product security, I bring over two decades of experience integrating secure design, threat modeling, and architecture reviews into fast-paced development environments. Helping engineering organizations, from startups to global enterprises, embed security across the SDLC process with prioritized, cost effective controls that support velocity and scale."
Twenty years ago, my career started in offensive security and hands-on security engineering. In the early years, I was involved in and led penetration testing programs for major Australian financial institutions, delivering high impact assessments across web, mobile, and critical infrastructure. This foundational experience in identifying real world vulnerabilities shaped a practical, engineering first philosophy in me, one that would later define my approach to security engineering. As the scope expanded, I began advising product teams on secure architecture design, performing indepth code reviews, and developing penetration testing programs and teams across regions including Australia, the broader APAC region, U.S. and Israel.
Moving from external testing to embedded product security, I began working with fast-growing software companies to build inhouse capabilities from the ground up. I played a pivotal role in scaling the product security team for a global SaaS company, designing and implementing secure development practices across diverse codebases and global engineering teams. This included embedding security into CI/CD pipelines, deploying SAST, DAST, and SCA tooling and creating engineering driven security champion programs. Over time, I also built robust vulnerability management workflows, defined remediation SLAs and created automated risk reporting pipelines that gave executives real time insight into a product's security posture.
In the past decade, I have refined my identity as a product security engineering partner. I have architected secure by default tooling, implemented secrets management platforms, hardened application platforms with protective middleware (like anti-SSRF endpoints) and launched self service assurance platforms to shift security left at scale. Bug bounty programs, secure app store submission frameworks, and threat modeling exercises became part of the standard operating model I introduced and developed at companies. Today, I continue to help modern software companies embed security deeply into their engineering culture, empowering teams to ship fast, and ship securely, with security designed as a core feature and not an afterthought.