Mission and team
Mission
To provide cutting-edge content that enables complete, detailed monitoring of enterprise network activity for threat hunting, analysis, and response.
Team
Martin Arlitt
Security Researcher
Martin Arlitt
Security Researcher
Ignacio Arnaldo
Director, Data Science
Ignacio Arnaldo
Director, Data Science
Jim Barlow
Manager, Research
Jim Barlow
Manager, Research
Ujwala Bhagavatula
Network Security Data Scientist
Ujwala Bhagavatula
Network Security Data Scientist
David Burkett
Security Researcher - Cloud
David Burkett
Security Researcher - Cloud
Peter Cullen
Principal Engineer, Network Traffic
Peter Cullen
Principal Engineer, Network Traffic
Houston Deebockum
DevOps / Infra. Engineer
Houston Deebockum
DevOps / Infra. Engineer
Mario De Tore
Cloud Security Researcher
Mario De Tore
Cloud Security Researcher
Mohan Dhawan
Senior Security Researcher
Mohan Dhawan
Senior Security Researcher
Paul Dokas
Senior Director, Corelight Labs
Paul Dokas
Senior Director, Corelight Labs
Jan Grashoefer
Senior Security Researcher
Jan Grashoefer
Senior Security Researcher
Travis Green
Security Researcher
Travis Green
Security Researcher
Seth Hall
Co-Founder Emeritus
Seth Hall
Co-Founder Emeritus
Ali Islam
Vice President, Corelight Labs
Ali Islam
Vice President, Corelight Labs
Ali Islam is a seasoned R&D leader with over 20 years of experience in cybersecurity, known for building and scaling high-performing global teams. His expertise spans the full product lifecycle—from launching successful 0-to-1 products to evolving mature platforms with step-function innovations that drive significant ARR growth and customer retention.
Ali joins Corelight from Palo Alto Networks, where he spent five years leading the development and global scaling of their malware analysis platform, helping double its revenue to over $750M. He also spearheaded the conception and launch of two cutting-edge AI security products: AI Model Scanning and AI Red Teaming.
Previously, Ali was the co-founder and CEO of Numen, a startup focused on connected car security. Earlier in his career, he was a founding security researcher at FireEye Labs, where he later led the overall R&D efforts for their flagship Network (NX) and Email (EX) products—advancing APT detection and machine learning-driven automation systems.
Ali holds multiple patents and has spoken at major industry conferences including Defcon and RSA. He has also collaborated with government agencies such as the US Department of Homeland Security (DHS) and the Korean Internet & Security Agency (KISA) on intelligence-sharing efforts to combat nation-state threats.
He earned an MBA from UC Berkeley and a master’s in network security from Monash University in Australia.
Keith Jones
Principal Security Researcher
Keith Jones
Principal Security Researcher
Mei Lam
Lead Data Scientist
Mei Lam
Lead Data Scientist
Youssef Lotfi
Machine Learning Engineer
Youssef Lotfi
Machine Learning Engineer
Jeff Lucovsky
Principal Engineer
Jeff Lucovsky
Principal Engineer
Simeon Miteff
Senior Security Researcher
Simeon Miteff
Senior Security Researcher
Yacin Nadji
Lead Security Researcher
Yacin Nadji
Lead Security Researcher
Dubem Nwoji
Security Researcher
Dubem Nwoji
Security Researcher
Vern Paxson
Co-founder & Chief Scientist
Vern Paxson
Co-founder & Chief Scientist
Mike Peters
Senior Engineering Manager
Mike Peters
Senior Engineering Manager
Julien Piet
Research Intern
Julien Piet
Research Intern
Deepali Prasad
Senior Detection Engineer
Deepali Prasad
Senior Detection Engineer
Ben Reardon
Lead Security Researcher
Ben Reardon
Lead Security Researcher
Jonathan Stasiak
Manager, Research Infrastructure
Jonathan Stasiak
Manager, Research Infrastructure
Michael Truong
Lead Engineer
Michael Truong
Lead Engineer
Brijesh Vora
Machine Learning Engineer
Brijesh Vora
Machine Learning Engineer
Scientific roots
Julien Piet, Aashish Sharma, Vern Paxson, and David Wagner.
Network Detection of Interactive SSH Impostors Using Deep Learning
Proc. USENIX Security, August 2023.
Julien Piet, Dubem Nwoji, and Vern Paxson.
GGFAST: Automating Generation of Flexible Network Traffic Classifiers
Proc. ACM SIGCOMM, September 2023.
Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner.
Hopper: Modeling and Detecting Lateral Movement.
Proc. USENIX Security Symposium, August 2021.
Keith J. Jones, Yong Wang.
Malgazer: An Automated Malware Classifier With Running Window Entropy and Machine Learning
Sixth International Conference on Mobile And Secure Services (MobiSecServ), 2020.
Ignacio Arnaldo, Kalyan Veeramachaneni.
The Holy Grail of "Systems for Machine Learning": Teaming humans and machine learning for detecting cyber threats.
ACM SIGKDD Explorations Newsletter 21 (2), 39-47, 2019.
Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner.
Detecting and Characterizing Lateral Phishing at Scale.
Proc. USENIX Security Symposium, August 2019.
Ankit Arun, Ignacio Arnaldo.
Shooting the Moving Target: Machine Learning in Cybersecurity.
USENIX Conference on Operational Machine Learning (OpML 19), 13-14, 2019.
Ignacio Arnaldo, Kalyan Veeramachaneni, Mei Lam.
eX2: A Framework for Interactive Anomaly Detection.
Intelligent User Interfaces Workshops, 2019.
Ignacio Arnaldo, Ankit Arun, Sumeeth Kyathanahalli, Kalyan Veeramachaneni.
Acquire, Adapt, and Anticipate: Continuous Learning to Block Malicious Domains.
IEEE International Conference on Big Data (Big Data), 1891-1898, 2018.
Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David Wagner.
Detecting Credential Spearphishing Attacks in Enterprise Settings.
Proc. USENIX Security Symposium, August 2017.
Ignacio Arnaldo, Alfredo Cuesta-Infante, Ankit Arun, Mei Lam, Costas Bassias, Kalyan Veeramachaneni.
Learning Representations for Log Data in Cybersecurity.
International Conference on Cyber Security Cryptography and Machine Learning, 2017.
Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou.
Practical Attacks Against Graph-based Clustering.
Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017.
Charles Lever, Robert Walls, Yacin Nadji, David Dagon, Patrick McDaniel, Manos Antonakakis.
Domain-Z: 28 Registrations Later - Measuring the Exploitation of Residual Trust in Domains.
IEEE Symposium on Security and Privacy (Oakland), 2016.
Kalyan Veeramachaneni, Ignacio Arnaldo, Vamsi Korrapati, Constantinos Bassias, Ke Li.
AI^2: Training a Big Data Machine to Defend.
IEEE 2nd International Conference on Big Data Security on Cloud, 2016.
To learn more about joining Corelight Labs, visit our Careers page.