BR

Brandon Rizzo

Senior Security Engineer at Amazon | CISSP,GCTI,GMON,GPEN,GCIH,CEH
Request removal
Email: ****o@amazon.com
LinkedIn: Brandon Rizzo
Location: Greater Seattle Area
Current employer: Amazon
Current title:
Senior Security Engineer
Last updated: 22/05/2023 00:09 AM
Get valid emails for Brandon and 500M other professionals
20 free emails each month. No credit card required.
500M
Business Profiles
20M
Company Profiles
200M
Email addresses
98%+
Email Delivery
About

Brandon Rizzo is from Greater Seattle Area. Brandon works in the following industries: "Computer Software", "Internet", "Military", "Retail", and "Computer & Network Security". Brandon is currently Senior Security Engineer at Amazon, located in Greater Seattle Area. In Brandon's previous role as a Security Engineering/Threat Intelligence at Microsoft, Brandon worked in Redmond, Washington until Dec 2019. Prior to joining Microsoft, Brandon was a Lead/Senior Information Security Engineer at REI and held the position of Lead/Senior Information Security Engineer at Greater Seattle Area. Prior to that, Brandon was a Senior Security Consultant at Mandiant, A FireEye Company, based in Baltimore, Maryland Area from Nov 2016 to Jul 2017. Brandon started working as Digital Network Exploitation Analyst/Cyber Threat Intelligence SME at United States Department of Defense in Baltimore, Maryland Area in Feb 2015. From Dec 2010 to Dec 2014, Brandon was Digital Network Exploitation Analyst/Cyber Threat Intelligence at United States Navy, based in Navy Information Operations Command Pensacola, Florida.

You can find Brandon Rizzo's email on finalScout.com. FinalScout is a popular professional database with more than 500 million business professionals and over 200 million company profiles.

Brandon Rizzo's current jobs
Company: Amazon
Title: Senior Security Engineer
Period: Dec 2019 - Present (4 years, 4 months)
Location: Greater Seattle Area

●Providing technical leadership on the threat intelligence team, supporting and representing threat intelligence and our efforts across the company. Leading and participating in threat assessments. ●Building bridges between functions, with a goal of improving and and optimizing our prevention/detection/response to emerging threats. ●Vendor management, onboarding, RFPs, negotiations, etc. ●Onboard, and ramp up new team members. Played an instrumental role in expansion and growth of the team from just a few members to over 3x in size and 3x locations. ●Interviewing/hiring of security engineers and industry specialists (72+interviews and counting). ●Providing input to team, organization, and cross-company security strategies and efforts ●Justified the replacement of internally developed threat intelligence system. Onboarded 3P Threat Intelligence Platform (TIP), manage and consult/provide guidance for usage, and partner on the development of integrations with stakeholders across the company. ●Providing mentorship to internal aspiring security engineers and current security engineers looking to progress in their careers or job functions.

Brandon Rizzo's past jobs
Company: Microsoft
Title: Security Engineering/Threat Intelligence
Period: Apr 2018 - Dec 2019 (1 year, 8 months)
Location: Redmond, Washington

●Led engineering integration efforts to ensure threat intelligence is delivered to analysts and defenders in the tools they use most often. These integrations included TIP integration w/Case Management, TI integration with big data repositories, and others. ●Leveraged threat intelligence to improve the prioritization of preventative controls and mitigations to improve defenses of Microsoft. ●Supported response to internal incidents by managing intelligence collected during investigations and building a common understanding of threat activities. Standardized this process for all large security adversary-related incidents. ●Provided actionable insights for threat mitigation via hand-crafted threat summary reports to executive leadership and key stake holders including the CISO, Board of Directors, etc. ●Managed and evangelized a Threat Intelligence Platform (TIP) utilized to store, tag, process, and disseminate indicators across the various Microsoft defender teams. ●Fulfilled the Threat Intelligence Officer Role for Microsoft's Digital Security and Risk Engineering (DSRE) Threat Intelligence Team, embedded within the Cyber Defense Operations Center. ●Delivered relevant and actionable Indicators of Compromise (IOCs) to teams across Microsoft to improve our ability to detect threats in our environment. ●Collected, processed and analyzed open source reporting as well as 1st and 3rd party threat intelligence feeds for relevance. Developed a process to prioritize and categorize these various data sources.

Company: REI
Title: Lead/Senior Information Security Engineer
Period: Sep 2017 - Apr 2018 (7 months)
Location: Greater Seattle Area

● Led threat hunting initiative for the enterprise, including vendor technology reviews, security control recommendations, gap analysis, and threat-hunting strategy development. ● Utilized as a technical SME by SOC engineers and analysts in the areas of URL Filtering, E-mail Security, IPS/IDS, endpoint security, SIEM technologies, logging, malware analysis, threat intelligence, and many more areas. ● Key contributor to creation and development of REI’s Incident Response (IR) playbook/runbook. ● Developed and integrated security control capabilities into SIEMs such as Splunk, by way of creating new dashboards, searches, automated alerts, and reporting. ● Provided technical mentorship to SOC personnel and created several technical capabilities to improve security detection posture throughout the company. ● Developed enterprise-wide review process for all data sources feeding REI's SIEM solution, resulting in much higher data relevancy, and less storage utilization.

Title: Senior Security Consultant
Period: Nov 2016 - Jul 2017 (8 months)
Location: Baltimore, Maryland Area

Monitored and improved enterprise-wide network threat detection, prevention, and response platform utilized by numerous federal agencies. Performed suspicious binary triage on a consistent basis, advancing customer’s denylisting capabilities, enabling accurate detection via the creation and deployment of Snort and Yara rules. Prevented malware command and control (C2) servers from communicating with infected endpoints utilizing regex pattern blocking and automated IP address/URL blocking strategies. Utilized Splunk to create custom dashboards based on malicious event data and indicators within customer environments. Provided mentorship to fellow analysts on threat analysis and cyber triage tools, which improved the collective understanding of the continuous shift towards threat-driven analytics. Maintained, tuned, and monitored Intrusion Prevention System (IPS) signatures to minimize false positives and increased the accurate prevention and mitigation of malware from customer systems. Configured system alert notifications for a vast network of security sensors to improve the ease of further analysis within SIEM environments. Provided malware analysis support, created custom dashboards within SIEM environments, and performed various systems engineering tasks in relation to FireEye/Mandiant security appliances.

Title: Digital Network Exploitation Analyst/Cyber Threat Intelligence SME
Period: Feb 2015 - Nov 2016 (1 year, 9 months)
Location: Baltimore, Maryland Area

Led technical engagements with key U.S. Intelligence Community partners, using well-developed interpersonal skills and ability to foster cooperative problem solving, regarding high-priority cyber operations. Led multiple technical analysis integration efforts that resulted in comprehensive analysis community-wide against several several high-priority emerging foreign cyber threats. Conducted advanced technical research of metadata and content, incorporating advanced cloud-based analytics and data science best practices, to expose intelligence leads and exploitation opportunities, maintain continuity, ensure continued collection, provide indications and warning, and identified potential targets of interest for future intelligence operations. Delivered high-impact technical analysis and improved the Agency’s overall analytic capability by documenting and sourcing technical data across multiple tools and services. Created comprehensive sourcing standards for technical data sharing, ensuring meaningful technical data was readily available to pertinent cyber operators, analysts, and leadership. Outlined technical priorities and partnered extensively with Cyber Threat Operations Center and support staff to develop innovative intelligence development solutions, including improving in-house ability to use analytic resources from other organizations for mapping non-traditional target digital networks.

Title: Digital Network Exploitation Analyst/Cyber Threat Intelligence
Period: Dec 2010 - Dec 2014 (4 years)
Location: Navy Information Operations Command Pensacola, Florida

Provided Computer Network Operations expertise in support of Navy, National, and Joint requirements in the areas of Digital Network Intelligence (DNI) and Computer Network Defense (CND), resulting in intelligence community awareness on highly sensitive and time-critical targets.

Brandon Rizzo's education
University of Maryland Global Campus
Associate’s Degree
2012 - 2013
University of Maryland Global Campus
Graduate Certificate
2015 - 2016
University of Maryland Global Campus
Bachelor's Degree
2012 - 2014
University of Maryland Global Campus
Master’s Degree
2015 - 2017
Brandon Rizzo's top skills
Data Analysis Computer Security National Security Defense Intelligence Technical Writing Program Management Government Intelligence Analysis Computer Network Operations Systems Engineering Report Writing Technical Analysis Military U.S. Department of Defense Analysis Network Security Computer Forensics Information Assurance Network Engineering
Brandon Rizzo's Colleagues
AS
Amit Singla
Director Of Engineering
Seattle, Washington, United States
NF
Nancy Felix
Sr Leader, Software Development - Amazon Devices
Seattle, Washington, United States
WB
William Bowes
Vice President of Engineering
Seattle, Washington, United States
CP
Cecilia Pizzurro
Head of Engineering - Alexa Devices Ambient Home Platform
Seattle, Washington, United States
HG
Horacio Gomez
Sr. Global Commodity Manager
Seattle, Washington, United States
Brandon Rizzo has 880K+ colleagues in total at Amazon. You can find all of them in FinalScout.
Other people named Brandon Rizzo
BR
Brandon Rizzo
Director of DevOps | Engineering
New York, New York, United States
BR
Brandon Rizzo
Portfolio Manager, Hospitality and Operations
New York, New York, United States
BR
Brandon Rizzo
Project Manager
Quincy, Massachusetts, United States
BR
Brandon Rizzo
Area Director
Maitland, Florida, United States
BR
Brandon Rizzo
Senior Financial Analyst
Chicago, Illinois, United States
There are 22 other "Brandon Rizzo". You can find all of them in FinalScout.
Scrape emails from LinkedIn for free
20 free emails each month. No credit card required.
Regular search results
Search for leads on linkedin.com and scrape the search results
Sales Navigator search results
Search for leads in LinkedIn sales navigator and scrape the search results
Group members
Scrape members from any LinkedIn group without joining it
Event attendees
Scrape event attendees from any LinkedIn event
Directory