Skip to content
View bgeesaman's full-sized avatar

Block or report bgeesaman

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
bgeesaman/README.md

Hire Brad Geesaman

I'm Brad Geesaman 👋 , a Senior Cloud-Native and Kubernetes Security Professional with years of experience building and securing Google Cloud, AWS, and Kubernetes Security platforms at several organizations of varying scale. I've been an active member of the Kubernetes community since 2017 and have focused on educating and guiding platform and security teams to run containerized workloads securely with minimal friction. I am a strong advocate for migration to cloud-native and containerized workloads in accordance with the desired threat model and in balance with the needs of the business.

My specialties are building on, attacking, and hardening Kubernetes, Google Cloud, and AWS environments. I enjoy evaluating features and capabilities for their security posture, demonstrating weaknesses through hands-on walkthroughs, and developing educational materials for end users to be able to protect their own environments. I know that security teams often lack deep Kubernetes expertise, and cloud infrastructure teams often lack deep security expertise. I want to be in a position to bridge that gap and bring clarity to their day-to-day lives for a given issue.

And I'm actively looking for my next opportunity!

  • Location: Fully Remote
  • Employment Type: Full time employee
  • Example Roles: Security Researcher and Advocate

For more details about my experience, my CV/Résumé 📜 is directly available online or as a PDF

If you’re looking for experienced talent to help your community understand how to make securing cloud-native systems and tools easier, I’d love to chat. Some of the topics I'd like to discuss with you:

  • What is the mission of your organization?
  • What challenges are most pressing to you or your customers?
  • Where do you think I can do the most good?
  • What is the makeup of the team in terms of diversity?
  • What is the team/org structure?
  • How does the team/org contribute back to the community?
  • What is your interview process like?
  • What is your hiring timeline for this position?

Pinned Loading

  1. OpenCSPM/opencspm OpenCSPM/opencspm Public archive

    Open Cloud Security Posture Management Engine

    Ruby 334 68

  2. kube-env-stealer kube-env-stealer Public

    Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env

    Shell 102 11

  3. darkbitio/k8s-mirror darkbitio/k8s-mirror Public archive

    Creates a local mirror of a Kubernetes cluster in a docker container to support offline reviewing

    Ruby 338 23

  4. darkbitio/gcp-iam-role-permissions darkbitio/gcp-iam-role-permissions Public

    Exports primitive and predefined GCP IAM Roles and their permissions

    Ruby 108 20

  5. CVE-2019-11253 Kubernetes API Server... CVE-2019-11253 Kubernetes API Server YAML Parsing Remote Denial of Service PoC aka "Billion Laughs"
    1
    #!/usr/bin/env bash
    2
    
                  
    3
    # CVE-2019-11253
    4
    # https://github.com/kubernetes/kubernetes/issues/83253
    5
    # Shout out: @raesene for poc collab, @iancoldwater + @mauilion for
  6. darkbitio/mkit darkbitio/mkit Public archive

    MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes cluster objects and the workloads/resources running inside t…

    Dockerfile 401 26