Arkadiy Tetelman
About
Arkadiy Tetelman is from San Francisco Bay Area. Arkadiy works in the following industries: "Computer Software", "Internet", and "Financial Services". Arkadiy is currently Principal Security Architect at Chime, located in San Francisco Bay Area. In Arkadiy's previous role as a Head of Application & Infrastructure Security at Chime, Arkadiy worked in San Francisco until Jul 2021. Prior to joining Chime, Arkadiy was a Head Of Security at Lob and held the position of Head Of Security at San Francisco Bay Area. Prior to that, Arkadiy was a Staff Application Security Engineer at Lob, based in San Francisco from Apr 2018 to Mar 2019. Arkadiy started working as Senior Application Security Engineer at Airbnb in San Francisco in Jan 2017. From Jul 2014 to Dec 2016, Arkadiy was Senior Application Security Engineer at Twitter, based in San Francisco. Prior to that, Arkadiy was a Backend Software Engineer at CardSpring (acquired by Twitter), based in San Francisco from Sep 2012 to Jul 2014. Arkadiy started working as Backend Software Engineer at Contracting in Mar 2011.
You can find Arkadiy Tetelman's email on finalScout.com. FinalScout is a popular professional database with more than 500 million business professionals and over 200 million company profiles.
Arkadiy Tetelman's current jobs
I've transitioned back to an individual contributor role :)
Arkadiy Tetelman's past jobs
At Chime I recruited and currently lead a team of 9 to secure our application code and AWS/Kubernetes infrastructure. On the application security front we manage the bug bounty program, provide security code and design reviews, implement static analysis and secrets scanning into our CI/CD pipeline, coordinate 3rd party penetration tests, mitigate entire vulnerability classes, and evangelize security within engineering with our security champions program. We place a heavy emphasis on partnering with engineering, as security can only be successful as a collaborative and empathetic function. On the infrastructure security front we enable preventative and detection controls across our dozen AWS accounts ranging from IAM least privilege, service control policies, s3 public access blocks, runtime misconfiguration scanning, cloudtrail alerting, and more - we write safe-by-default terraform modules & sentinel policies to prevent vulnerable resources from ever making it into production in the first place. We also secure more than a dozen Kubernetes clusters, all managed in code via ArgoCD.