“I believe Julie was the first hiring manager I had an in person intake with after joining Walmart Global eCommerce when I was working Information Security and Infrastructure roles. I gained so much insight into Information Security teams while working with her to source candidates to round out established teams and build out a new one. I also learned about self healing systems from a presentation she gave utilizing her Dev Ops and cyber security knowledge. She's very responsive, involved, supportive, and helpful which makes staffing for tough positions a lot smoother. She cares about her people and their success.”
About
Open to Board of Director and publishing/webcasting opportunities.
I have a…
Contributions
-
How can you build trust with stakeholders unfamiliar with design?
Find parallels that can resonate with something they *do* understand. For example, Malcolm Gladwell's 10,000-hour rule to achieve foothold on mastering a subject carries credence because many people in different disciplines have experienced and can attest to this.
Activity
-
Michael Vizard recently interviewed RAD Security's, CTO/Co-Founder Jimmy Mesta 🤙 to discuss election security. Mike asked some pretty spicy 🌶…
Michael Vizard recently interviewed RAD Security's, CTO/Co-Founder Jimmy Mesta 🤙 to discuss election security. Mike asked some pretty spicy 🌶…
Liked by Julie Tsai
-
Best swag of the year! The ProjectDiscovery folks sent me this logo hoodie with this badass design. Seriously better than some of the designer…
Best swag of the year! The ProjectDiscovery folks sent me this logo hoodie with this badass design. Seriously better than some of the designer…
Liked by Julie Tsai
-
I can’t imagine people I’d want to hear more from or whose opinions I value more than Chenxi Wang, Ph.D. , Joe Sullivan , Vitaly Gudanets and Jim…
I can’t imagine people I’d want to hear more from or whose opinions I value more than Chenxi Wang, Ph.D. , Joe Sullivan , Vitaly Gudanets and Jim…
Liked by Julie Tsai
Education
Volunteer Experience
-
HeART Program Advisory Board
Kids at Lines Ballet
- Present 4 years 5 months
Children
https://linesballet.org/education/youth-school-programs/funded/
-
Board Member
Creative Solutions for Amputees
- Present 11 years
Civil Rights and Social Action
http://cs4a.org/
-
Volunteer & Board Member
Grupo de la Comida
- 26 years 7 months
-
Volunteer
DanceWright
- 1 month
Publications
-
DevSecOps Easter Eggs
DZone
Being aware of the blind spots in an organization (and people) can go a long way toward defending against the unknowns. But where to start? Find out here.
-
The Purple Book of Software Security
Purple Book Community
Analysis on current state of software security, including software supply chain, culture, GRC, metrics, and making the business case. Co-authored by leading software security leaders with many years of experience in a wide range of industries and specializations.
-
A DevSecOps Field of Dreams: Feedback Loops
Voices of All Day DevOps, Volume1
Patents
-
System, method, and non-transitory computer-readable storage media for analyzing software application modules and provide actionable intelligence on remediation efforts
Issued US US20160217288A1
In different embodiments of the present invention, systems, methods, and computer-readable storage media allow a user to analyze software application modules, during development of the software. The present invention may be used to analyze the software application modules, to identify vulnerabilities and to provide the user with actionable intelligence that may be used to improve the security of the software application modules. The actionable intelligence may include a list or groupings of the…
In different embodiments of the present invention, systems, methods, and computer-readable storage media allow a user to analyze software application modules, during development of the software. The present invention may be used to analyze the software application modules, to identify vulnerabilities and to provide the user with actionable intelligence that may be used to improve the security of the software application modules. The actionable intelligence may include a list or groupings of the vulnerabilities ranked based on severability, type, and/or location.
Courses
-
CISSP Security Management 414
SANS Institute
-
Unix Systems II
UC Santa Clara
Languages
-
French
Limited working proficiency
-
Chinese
Elementary proficiency
Recommendations received
-
LinkedIn User
8 people have recommended Julie
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Julie Tsai in United States
-
Julie Tsai
-
Julie Tsai
Clinical Research Contracts
-
Julie Tsai
-
Julie Tsai
Director at Shirley/Mastic Kumon Math and Reading Center
54 others named Julie Tsai in United States are on LinkedIn
See others named Julie Tsai