While having "played around" with computers as far back as high school, Aaron held out hope to become a famous dj or video game creator in the 90s. It wasn't until 2004 when he began his long twisted journey into information security, when the super computers he was working on at PSC were hacked by a dire and sophisticated threat that penetrated over a thousand organizations over a multi-year periodâ€_that turned out to be a 16 year old kid in Uppsala, Sweden during the Stakkato attacks. Aaron switched gears, began piecing together a security practice at the PSC, went to grad school at Carnegie Mellon, and hopped gigs to go work at CERT/CC. He then began sharing his knowledge with graduate students at CMU as adjunct faculty. After a few years of "applied research", he jumped gigs for more "applied"-ness / less "research"-ness in the Dell SecureWorks CounterThreatUnit's Special Ops team, which created and operated an end point detection platform in Targeted Incident Response engagements. Recently he has been focused on sharing threat intelligence in a programmatic way at ThreatStream.