Senior embedded systems reverse engineer with multiple decades of experience spanning federal government defense operations, proprietary systems development at a specialized embedded systems company, and independent consulting. Specializes in firmware vulnerability research, systems emulation, custom static analysis tool development, and protocol reverse engineering across multiple architectures including ARM, PowerPC, and x86.
Demonstrates exceptional expertise through clearance-level research in federal government defense operations, development of proprietary rewindable systems emulators, and advanced vulnerability research using fuzzing, Ghidra, and code property graph analysis. Has provided Android kernel auditing for patent pre-litigation analysis, demonstrating direct litigation support and expert testimony experience.
Career Highlights
- Led reverse engineering and vulnerability research at a specialized embedded systems company, developing proprietary rewindable systems emulators for hardware analysis across multiple architectures
- Performed embedded systems research, cryptographic library development, and security analysis for federal government defense operations
- Designed and implemented enterprise agent command and control platform using Ruby on Rails with Postgres for real-time monitoring and analytics
- Conducted independent consulting on IDS signature design, BACnet protocol implementation, and Android kernel security analysis for patent pre-litigation matters
- Developed custom static analysis tools using Joern, JanusGraph, and Ghidra for embedded platform vulnerability research and binary signature detection
- Performed forensic analysis using EnCase and FTK on network intrusions, malware analysis, and systems instrumentation for enterprise security
Expert Qualifications
- Retained as consulting expert for Android kernel patent pre-litigation analysis and source/binary auditing
- Extensive demonstrated expertise in embedded systems security, reverse engineering, firmware analysis, and vulnerability research
- Extensive background in federal government defense operations, cryptographic systems, and high-assurance systems development
- Proficient in industry-standard reverse engineering tools including Ghidra, IDA Pro, custom binary analysis frameworks, and protocol analysis platforms
