Corporate Security (CorpSec)
π Welcome to Corporate Security, we’re glad you’re here! You may also know us as the former IT Operations team that moved from the Finance to Security division in early 2024.
Need Help?
Please try exploring the following pages to see if your question has been answered in the handbook pages. If not, please ask in the #it_help
channel and one of our Support Analysts will reply as soon as possible.
- CorpSec Onboarding 101 Guide
- CorpSec Support Guide
- CorpSec Services
- CorpSec Systems and Tech Stack Apps
- Internal Handbook
- System Administration and Runbooks Handbook
- Ask in the
#it_help
Slack channel
What We Do
Mission
As a remote company, we do not have office buildings, physical datacenters, or other traditional IT environments. All of our team members are issued a laptop that they use to work from home or on the road. Although our engineering and product teams are building software that is deployed on AWS and GCP, almost all of our corporate software is vendor-managed software-as-a-service (SaaS). Although this results in a simpler physical threat landscape, the cybersecurity threat landscape is vast and still requires a lot of attention to do it right.
Our mission is to empower our employees to be productive with the technology provided by the business, enable the business to be successful, protect our customers and their data, and provide internal security for GitLab (the company) and our team member’s use of GitLab (the product).
GitLab is both a company and a product. The Corporate Security department focuses on protecting the technology that the company uses to conduct business internally, and provides the hardware, software, and tools that our team members need to get their job done. We have a 24x5 technical support helpdesk for team members and have engineers that configure and maintain many of our company-wide tech stack applications. We also invest heavily in device trust and identity management to provide the highest level of security assurance for the administrators of our product and ensure all appropriate controls are in place when handling customer data.
Prime Directive
- Safeguard our organization’s digital assets, ensuring the integrity, confidentiality, and availability of all data.
- Implement robust security measures, fostering a culture of awareness and compliance among employees, and continuously monitoring and enhancing our information technology systems to protect against evolving threats.
- Leverage the GitLab platform (dogfooding) to assist us in the securing of GitLab.
- Provide reliable, secure and efficient IT and Security engineering, innovation, and services with Zero Trust principals to support cross-functional organizational goals
Scope
- Architecting next-generation automation and integration between security-related systems that provides data consistency, reliability, strong security, and auditability.
- Building relationships with cross-department system owners and proposing solutions to ensure our tech stack applications conform to our latest security best practices
- Consolidating and refactoring legacy tech debt
- Designing processes and choosing software tools that improves back office automation or mitigates security risks
- Escalation engineering and crisis response for leadership teams
- Factor in cost, security, compatibility, maintainability and user experience when making decisions
- Growing other team membersβ skill sets through mentorship to improve operational efficiency and encourage professional development
- Handbook documentation for processes and systems architecture
- Identity and access management (IAM)
- Joint collaboration with process and system owners across the company for improving automation efficiency, security posture, and vulnerability management
- Keeping leaders and stakeholders informed of next-gen initiatives and contributing to creating automated analytics for day-to-day IT and Security operations
- Leading innovation opportunities between several teams with a willingness to experiment and to boldly confront problems of large complexity and scope
- Making technical decisions on behalf of the department and organization while providing presentation support to leaders during technical discussions
- New tech stack (vendor) application onboarding and provisioning
- Onboarding provisioning, offboarding deprovisioning
- Policy and configuration management for organization-wide applications and systems that we manage
- Role-based access control (RBAC)
- Shipping laptops to new team members and refreshing older models
- Tech support for team members and temporary service providers
- User experience and productivity optimization for internal software and tools
- Vulnerability and malware risk mitigation
- Workflow automation for employee lifecycle
- X-Men, we are. Always be saving the day with a smile on your face!
- Yesterday’s problems are tomorrow’s opportunties for iteration
- Zero trust implementation
Direction and Strategy
- (Internal) CISO Multi-Year Information Security Goals and Priorities
- (Internal) CorpSec Direction and Strategy
- (Internal) CorpSec OKRs and Roadmap
- (Internal) CorpSec Projects and Initiatives
- Security Division OKRs
- (Internal) Corporate Security Epics List
- (Internal) Corporate Security Epics Gantt Chart
- (Internal) CorpSec Issue Tracker
- How We Work
Services
- π Please see CorpSec Support if you are looking for help.
- π Applications and Systems
- π Helpdesk Services
- π Access Requests
- π» Laptop and Logistics Services
- π¬ Onboarding
- π« Offboarding
- π§βπ» Tech Support (for Team Members)
- β Infrastructure Services
Engineering
- π How We Work
- π» Device Trust Engineering
- π Identity Engineering
- β Infrastructure Engineering
- π Platform Engineering
- π· SaaS Engineering
Who We Are
See the Team Directory.
Contact Us
- Tier 1 Self Service
- Tier 2 Helpdesk Support
- Tier 3 Escalation and Systems Engineering
- Tier 4 Automation Engineering
- Tier 5 Architecture and Crisis Management
- CorpSec Issue Tracker
- Engineers and System Owners - See CorpSec Systems for GitLab group handle and Slack group handle.
#corpsec
Slack Channel (for technical support, please ask in#it_help
)
- Helpdesk Team
#it_help
Slack Channel@it-help
Slack groupit-help [at] gitlab [dot] com
@gitlab-com/gl-security/corp/services
- Management Team
@gitlab-com/gl-security/corp/managers
- Tag the respective functional team manager or director in Slack.
- Director - Steve Manzuik
- Program Management - Steve Manzuik, Kim Waters
- Device Trust - Eric Rubin
- Helpdesk Support - Michael Beltran
- Infrastructure - Jeff Martin
- Laptops and Logistics - Michael Beltran
- Onboarding and Offboarding Day-to-Day Operations (Helpdesk Services) - Michael Beltran
- Onboarding and Offboarding Policy and Strategy (Identity Engineering) - David Zhu
- Platform Engineering (Custom Software Development) - Jeff Martin
- SaaS Engineering - David Zhu, Eric Rubin
- Sensitive Data or Employment Requests - Michael Beltran
Corporate Security (CorpSec) Support
As GitLab has grown organically, several departments and functional groups have their own System Administrators (“Tech Stack App/System Owners”) that handle day-to-day management of the tech stack applications that are specific to that department or functional group, within the framework of organization-wide compliance, infrastructure, and security best practices. Each tech stack application at GitLab has a System Owner that is the DRI for handling the implementation and day-to-day operational support for the team members that utilize that application (in their department or functional group). This has an added benefit of preventing the traditional IT department from being a bottleneck and allows each department to self-service as part of GitLab’s efficiency for the right group subvalue.
CorpSec Direction
Thank you for your interest in the direction of Corporate Security. See the internal handbook for our direction and roadmap with OKRs.
CorpSec Engineering
The Engineering team members are organized functionally based on the category of tech stack applications that we manage.
System Owners
Functional Team | Systems | Managers | Engineers |
---|---|---|---|
(Corporate) SaaS Engineering |
1Password GitLab.com IAM Policies Google Apps Google Calendar Google Drive Google Groups Google Mail Google Users Google Workspace (Org) Nira Okta Applications Okta Groups Okta Users Okta Workflows Service Accounts Slack Zoom |
EM David ZhuEM Eric RubinPM Kim WatersStaff Mark Loveless
|
Adam Huss Clayton Shank Erik Lentz Jacob Waters Justin Bisutti Marcus Whitaker Mohammed Al Kobaisy Zack Hardie |
Device Trust Engineering |
DriveStrike Jamf MDM Mobile Devices NordLayer VPN Okta Verify SentinelOne EDR Software Updates YubiKey |
EM Eric RubinPM Kim WatersStaff Mark Loveless
|
Adam Huss Clayton Shank Justin Bisutti Zack Hardie |
Identity Engineering |
ABAC and RBAC AuthN and AuthZ Policies Identity Governance (IGA) No Code Automation Onboarding Offboarding Role Entitlements |
EM David ZhuPM Kim WatersStaff Jeff Martin
|
Erik Lentz Jacob Waters Marcus Whitaker Mohammed Al Kobaisy |
Infrastructure Engineering Related Infrastructure Services |
AWS Azure DNS Domain Names Google Cloud Tech Debt Cleanup Teleport Bastion |
EM (Acting) Jeff MartinPM Kim WatersStaff Jeff Martin
|
Mohammed Al Kobaisy Vlad Stoianovici |
Platform Engineering (Self-Service Internal Provisioning Software) Related Demo Systems Related Sandbox Cloud |
Access Check (accesschk) Access Control (accessctl) Demo Systems (gitlabdemo.com/cloud) HackyStack Provisionesta Open Source Packages Systems Administration Handbook Training Systems (trainingctl) (Corporate) Terraform Config Mgmt |
Staff Jeff Martin
|
Jeff Martin AJ Romaniello (People Ops) Byron Boots (Sec Assurance) James Sandlin (Sec Assurance) Jacob Waters (CorpSec Identity) Logan Stucker (Demo) Scott Cosentino (Training) |
CorpSec Services
This is a placeholder page. Please see the links below for any child pages that exist.
CorpSec Systems and Tech Stack
CorpSec Team Directory
The Corporate Security department provides tech support helpdesk services for team members and temporary service providers (aka contractors, vendors, etc.), and configuration management engineering for the company-wide systems that we manage.
Team Directory
Functional Org Chart
graph TB CORPSEC_SVC["<b>Corporate Security (CorpSec)</b><br><i><b>Director:</b> Steve Manzuik</i>"]:::violet CORPSEC_SVC_HELPDESK["<b>Helpdesk Services</b><br><i><b>Manager:</b> Michael Beltran</i><br><i><b>Analysts:</b> Alex Krusiec (AMER)<br>Bruno Ferreira (EMEA)<br>Eoghan Dunne (EMEA)<br>Jeff Ford (AMER)<br>Jenny Wong (AMER)<br>Max Hirata (JAPAC)<br>Mic Rohr (AMER)<br>Steve Ladgrove (JAPAC)"]:::emerald CORPSEC_SVC_LOGISTICS["<b>Logistics Services (Laptops)</b><br><i><b>Manager:</b> Michael Beltran</i><br><i><b>Analysts:</b> Mic Rohr</i>"]:::emerald CORPSEC_SVC_INFRA["<b>Infrastructure Services</b><br><i><b>Program Manager:</b> Jeff Martin</i><br><i><b>Engineers:</b> Mohammed Al Kobaisy (EMEA)<br>Vlad Stoianovici (EMEA)"]:::emerald CORPSEC_ENG_SAAS["<b>(Corporate) SaaS Engineering</b><br><i><b>Eng Managers:</b> David, Eric</i><br><i><b>Program Manager:</b> Kim Waters</i><br><i><b>Staff Engineer:</b> Mark Loveless</i><br><i><b>Engineers:</b> Adam, Clayton, Erik,<br> Jacob, Justin, Marcus, Mohammed, Zack</i><br><br>1Password<br>GitLab.com IAM Policies<br>Google Drive<br>Google Workspace<br>Nira<br>Okta Configuration<br>Service Accounts<br>Slack<br>Zoom"]:::fuchsia CORPSEC_ENG_DEVICE["<b>Device Trust Engineering</b><br><i><b>Eng Manager:</b> Eric Rubin</i><br><i><b>Program Manager:</b> Kim Waters</i><br><i><b>Staff Engineer:</b> Mark Loveless</i><br><i><b>Engineers:</b> Adam, Clayton, Justin, Zack</i><br><br>DriveStrike<br>Jamf MDM<br>Mobile Devices<br>NordLayer VPN<br>Okta Verify<br>SentinelOne EDR<br>Software Version Updates<br>YubiKey"]:::fuchsia CORPSEC_ENG_IDENTITY["<b>Identity Engineering</b><br><i><b>Eng Manager:</b> David Zhu</i><br><i><b>Program Manager:</b> Kim Waters</i><br><i><b>Staff Engineer:</b> Jeff Martin</i><br><i><b>Engineers:</b> Erik, Jacob,<br>Marcus, Mohammed</i><br><br>ABAC and RBAC<br>AuthN and AuthZ Policies<br>Identity Governance (IGA)<br>No Code Automation<br>Onboarding<br>Offboarding<br>Role Entitlements"]:::fuchsia CORPSEC_ENG_INFRA["<b>Infrastructure Engineering</b><br><i><b>Program Manager:</b> Jeff Martin</i><br><i><b>Engineers:</b> Mohammed, Vlad<br><br>ARs and IAM (AWS/GCP)<br>Amazon Web Services (AWS)<br>Azure<br>Billing and Cost Mgmt<br>Domains and DNS<br>Google Cloud (GCP)<br>Multi-Tenant Org Architecture<br>Sandbox Cloud<br>Secrets Mgmt Platform<br>Tech Debt Cleanup<br>Teleport Bastion"]:::fuchsia CORPSEC_ENG_PLATFORM["<b>Platform Engineering</b><br><i><b>Program Manager:</b> David Zhu</i><br><i><b>Staff Engineer:</b> Jeff Martin</i><br><i>(+ contributors per project)</i><br><br>accesschk (IAM/RBAC)<br>accessctl (IAM/RBAC)<br>demosys (IAM/RBAC/Infra)<br>hackystack (Infra)<br>provisionesta (API/Auditlog)<br>Systems Handbook<br>trainingctl (Student IAM)<br>Terraform (Config Mgmt)"]:::fuchsia CORPSEC_SVC --> CORPSEC_SVC_HELPDESK CORPSEC_SVC --> CORPSEC_SVC_LOGISTICS CORPSEC_SVC --> CORPSEC_SVC_INFRA CORPSEC_SVC_HELPDESK <--> CORPSEC_ENG_SAAS CORPSEC_SVC_HELPDESK <--> CORPSEC_ENG_DEVICE CORPSEC_SVC_HELPDESK <--> CORPSEC_ENG_IDENTITY CORPSEC_SVC_LOGISTICS <--> CORPSEC_SVC_HELPDESK %% CORPSEC_ENG -.- CORPSEC_ENG_SAAS %% CORPSEC_ENG -.- CORPSEC_ENG_DEVICE %% CORPSEC_ENG -.- CORPSEC_ENG_IDENTITY %% CORPSEC_ENG -.- CORPSEC_ENG_INFRA %% CORPSEC_ENG -.- CORPSEC_ENG_PLATFORM CORPSEC_SVC_INFRA -.- CORPSEC_ENG_PLATFORM CORPSEC_ENG_PLATFORM -.- CORPSEC_ENG_IDENTITY CORPSEC_ENG_PLATFORM -.- CORPSEC_ENG_INFRA CORPSEC_SVC_INFRA <--> CORPSEC_ENG_INFRA %% CORPSEC_ENG_IDENTITY -.- CORPSEC_ENG_PLATFORM %% CORPSEC_ENG_INFRA -.- CORPSEC_ENG_PLATFORM classDef slate fill:#cbd5e1,stroke:#475569,stroke-width:1px; classDef red fill:#fca5a5,stroke:#dc2626,stroke-width:1px; classDef orange fill:#fdba74,stroke:#ea580c,stroke-width:1px; classDef yellow fill:#fcd34d,stroke:#ca8a04,stroke-width:1px; classDef emerald fill:#6ee7b7,stroke:#059669,stroke-width:1px; classDef cyan fill:#67e8f9,stroke:#0891b2,stroke-width:1px; classDef sky fill:#7dd3fc,stroke:#0284c7,stroke-width:1px; classDef violet fill:#c4b5fd,stroke:#7c3aed,stroke-width:1px; classDef fuchsia fill:#f0abfc,stroke:#c026d3,stroke-width:1px;
Manager Org Chart
graph LR JLEMOS["Josh Lemos<br>CISO"]:::slate KWATERS["Kim Waters<br>Program Manager"]:::slate SMANZUIK["Steve Manuzik<br>Sr Director, CorpSec"]:::orange subgraph "Support Helpdesk (aka End User Services)" direction TB AKRUSIEC["Alex Kruseic"]:::emerald BFERREIRA["Bruno Ferreira"]:::emerald EDUNNE["Eoghan Dunne"]:::emerald JFORD["Jeff Ford"]:::emerald JWONG["Jenny Wong"]:::emerald MBELTRAN["Michael Beltran<br>Manager"]:::orange MHIRATA["Max Hirata"]:::emerald MROHR["Mic Rohr"]:::emerald SLADGROVE["Steve Ladgrove"]:::emerald end subgraph "Device Trust and SaaS Engineering" MLOVELESS["Mark Loveless<br>Staff Engineer"]:::violet AHUSS["Adam Huss"]:::fuchsia CSHANK["Clayton Shank"]:::fuchsia ERUBIN["Eric Rubin<br>Manager<br>(Device Trust and SaaS)"]:::orange JBISUTTI["Justin Bisutti"]:::fuchsia ZHARDIE["Zack Hardie"]:::fuchsia end subgraph "Identity, Infrastructure, Platform, and SaaS Engineering" DZHU["David Zhu<br>Manager<br>(Identity and SaaS)"]:::orange ELENTZ["Erik Lentz"]:::fuchsia JWATERS["Jacob Waters"]:::fuchsia MWHITAKER["Marcus Whitaker"]:::fuchsia MALKOBAISY["Mohammed Al Kobaisy"]:::fuchsia VSTOIANOVICI["Vlad Stoianovici"]:::fuchsia JMARTIN["Jeff Martin<br>Staff Engineer<br>(Infra and Platform)"]:::violet end JLEMOS --- SMANZUIK SMANZUIK --- MBELTRAN SMANZUIK --- ERUBIN SMANZUIK --- DZHU KWATERS -.- SMANZUIK MLOVELESS -. Device<br>Trust .- ERUBIN MBELTRAN --- AKRUSIEC MBELTRAN --- BFERREIRA MBELTRAN --- EDUNNE MBELTRAN --- JFORD MBELTRAN --- JWONG MBELTRAN --- MHIRATA MBELTRAN --- MROHR MBELTRAN --- SLADGROVE ERUBIN --- AHUSS ERUBIN --- CSHANK ERUBIN --- ZHARDIE ERUBIN --- JBISUTTI DZHU --- JWATERS DZHU --- ELENTZ DZHU --- MWHITAKER DZHU --- MALKOBAISY DZHU --- VSTOIANOVICI JMARTIN --- DZHU SMANZUIK --- MLOVELESS SMANZUIK -.- JMARTIN JMARTIN -. Infrastructure<br>Services .- MALKOBAISY JMARTIN -. Infrastructure<br>Engineering .- VSTOIANOVICI classDef slate fill:#cbd5e1,stroke:#475569,stroke-width:1px; classDef red fill:#fca5a5,stroke:#dc2626,stroke-width:1px; classDef orange fill:#fdba74,stroke:#ea580c,stroke-width:1px; classDef yellow fill:#fcd34d,stroke:#ca8a04,stroke-width:1px; classDef emerald fill:#6ee7b7,stroke:#059669,stroke-width:1px; classDef cyan fill:#67e8f9,stroke:#0891b2,stroke-width:1px; classDef sky fill:#7dd3fc,stroke:#0284c7,stroke-width:1px; classDef violet fill:#c4b5fd,stroke:#7c3aed,stroke-width:1px; classDef fuchsia fill:#f0abfc,stroke:#c026d3,stroke-width:1px;
How We Work (CorpSec)
We have four approaches to how we work:
-
Support Helpdesk Services - We provide 24x5 technical support and access requests for team members and temporary service providers (contractors). Please help us prioritize your access request with
corpsec-priority::ar-high
(same/next day) orcorpsec-priority::ar-low
(same/next week) label. -
Configuration Operations - We handle day-to-day small configuration and change requests (less than an hour) for configuring the SaaS systems that CorpSec is responsible for. This also includes escalations from our helpdesk analysts. Please create an issue in our issue tracker with your request and add the
corpsec-priority::ops-high
(same/next day) orcorpsec-priority::ops-low
(same/next week) label. You can ask for preliminary guidance in #it_help and our on-call team members will respond and/or tag an appropriate engineer.
6f6d0996
)