Peter Cap
About
Peter Cap is from Seattle, Washington. Peter works in the following industries: "Computer Software", "Internet", and "Computer & Network Security". Peter is currently Senior Security Engineer at Twitter, located in Seattle, Washington. In Peter's previous role as a Senior Security Engineer at Microsoft, Peter worked in Redmond, WA until Sep 2019. Prior to joining Microsoft, Peter was a SENIOR SECURITY RESEARCHER at Microsoft and held the position of SENIOR SECURITY RESEARCHER at Redmond, WA. Prior to that, Peter was a Threat Analyst at Microsoft, based in Redmond, WA from Nov 2011 to Aug 2015. Peter started working as Principal Security Consultant at Symantec Corporation in Dec 2006. From Jun 2000 to Dec 2006, Peter was Cryptologic Technician (Collection) at US Navy.
Peter Cap's email is available on Finalscout.com free of charge. This database has a wealth of information on over half a billion business professionals and two hundred million companies.
Peter Cap's current jobs
Working in Twitter's Detection & Response Team (DART) within the InfoSec org, I performed security incident handling, primarily with an AppSec and Privacy focus.
Peter Cap's past jobs
In the Security & Compliance Threat Intelligence team, I drove threat research & response across Microsoft's Endpoint Protection, Endpoint Detection & Response, and Exploit Mitigation teams and supported intelligence activities within Office 365.
As a Senior Researcher in Microsoft's Malware Protection Center, I get to use my experience as an intelligence analyst to help the antimalware team track threat actors and stay on top of their latest tools. I still have the same challenges as my previous role, but now I get a direct hand in protecting over a billion endpoints worldwide from servers to embedded devices. That's a lot of reach.
Working in Microsoft's Trustworthy Computing organization has been my greatest challenge so far. It's not enough to analyze intrusions or catalog adversary tools and infrastructure. My work output has to result in positive changes to the entire Microsoft ecosystem, which often requires bridging disparate groups, silo busting, and catherding. If I can help drive a product change or help secure an online property with billions of customers, that's a win.
During my tenure with Symantec I provided specialized threat intelligence services as well as more generalized security consulting services for customers in the .mil/.gov space. This was a really challenging and fun time in my career when I got to stretch out of my comfort zone into areas that were really foreign to me, like cyber defense ops planning at USAFRICOM.
I served in two billets during my six years before the mast. First, I served in USS Deyo during an eighteen-month tour that including a six-month deployment coinciding with Operation Iraqi Freedom. Following OIF, USS Deyo was decommissioned and I transferred to shore for my "plankowner" tour at the Navy Cyber Defense Operations Command (NCDOC). My time at NCDOC is probably the prime formative experience of my career so far.