chat
expand_more

Abnormal Engineering Stories, Episode #6: Engineering Leadership at Rippling

Tony Dong, Director of Engineering at Rippling, is no stranger to the diverse set of engineering problems that fast-growing startups create. Before building and leading his teams at Rippling, Tony was CTO and co-founder at PerShop, a YC backed startup, and Senior Engineer at Twitter, Periscope, and TellApart.
November 8, 2021

Tony Dong, Director of Engineering at Rippling, is no stranger to the diverse set of engineering problems that fast-growing startups create. Before building and leading his teams at Rippling, Tony was CTO and co-founder at PerShop, a YC backed startup, and a Senior Engineer at Twitter, Periscope, and TellApart.

Tony’s role has quickly adapted and changed from individual contributor, to managing individual contributors, to now managing managers. Through that constant change, Tony has needed to re-invent himself and his team’s role and expectations—both for themselves and each other. In this interview, Tony and I will discuss his stories and strategies, including:

  • How he preserves and amplifies a startup culture in a rapidly growing company

  • The lessons he learned when starting to hire and manage engineering managers

  • How to give clear interview training and guidance on making consistent hire/no hire decisions

  • How to assess and recruit leaders into areas that you are not an expert in

We hope you enjoy it! Please do subscribe on Apple, Spotify, or Google Podcasts.
Abnormal Engineering Stories, Episode #6: Engineering Leadership at Rippling

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

B 2024 Cybersecurity Predictions
As AI becomes more prevalent in the new year, discover how our experts believe the world will change—for both good and bad.
Read More
B 11 27 23 ATO Stats
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Read More
B Unmasking Vendor Fraud
Learn about the techniques, tools, and technologies we use to train the models that form the backbone of our vendor fraud detection.
Read More
B ISC2
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Read More
B Good Bad Ugly Future of AI
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Read More
B Cryptocurrency Donations Attack
Attackers attempt to solicit fraudulent donations via cryptocurrency transfers under the guise of collecting donations for children in Palestine.
Read More