Sean Pollitt
About Sean Pollitt
Sean Pollitt is a Software Engineer II currently employed at FullStory, where he has worked since 2024. He has a diverse background in software engineering and cybersecurity, with previous roles at companies such as PwC, T-Mobile, and Chick-fil-A.
Work at FullStory
Sean Pollitt has been employed at FullStory as a Software Engineer II since 2024. He previously worked at FullStory as a Software Engineer from 2021 to 2024. His role involves developing software solutions and contributing to the company's product offerings. FullStory specializes in digital experience analytics, providing insights to improve user engagement.
Previous Experience in Cybersecurity
Before joining FullStory, Sean Pollitt worked at PwC as a Cybersecurity Consultant and Penetration Tester from 2018 to 2020. In this role, he focused on identifying vulnerabilities in client systems and providing recommendations for enhancing security measures. He also served as a Cybersecurity & Privacy Intern at PwC in 2017.
Internship Experience
Sean Pollitt gained valuable experience through several internships prior to his full-time roles. He interned at AT&T as a Software Engineer Intern in 2015 for three months in Dallas, Texas, and at Cricket Wireless in 2016 for three months in Atlanta, Georgia. Additionally, he completed a Cybersecurity & Privacy Internship at PwC in 2017 for two months.
Education and Expertise
Sean Pollitt studied at The University of Georgia from 2015 to 2018, where he earned a degree in Management Information Systems (MIS) and Computer Science. His educational background provides a strong foundation in software development and cybersecurity principles. He completed his high school education at Kennesaw Mountain High School from 2010 to 2014.
Early Career at Chick-fil-A
Sean Pollitt began his career as a Crew Member at Chick-fil-A Restaurants in Acworth, Georgia, from 2013 to 2015. This role provided him with early work experience in a fast-paced environment and helped develop his customer service skills.