Senior software engineer specializing in iOS security, WebKit vulnerability research, and 802.11 wireless protocol exploitation. Currently at a leading defense contracting firm, developing advanced CNO tools and iOS exploitation research capabilities. Previously at multiple major technology and defense companies, contributing to multi-threaded 802.11 collection systems modernization, ARM and custom processor firmware reverse engineering, and vulnerability discovery in wireless communication protocols.

Formal Education

  • Master's of Engineering in Computer Engineering from a leading research university
  • Bachelor of Science in Electrical Engineering and Mathematics from a top-tier research university

Career Highlights

  • Led iOS exploitation research and CNO tool development at a leading defense contracting firm, focusing on WebKit and XNU kernel internals
  • Architected and contributed to modernization rewrite of multi-threaded 802.11 collection systems
  • Performed ARM and custom processor firmware reverse engineering to identify vulnerabilities in commercial hardware
  • Developed vulnerability discovery capabilities for Wi-Fi and Bluetooth LE protocols in common devices
  • Built automated testing systems enabling validation across multiple devices simultaneously
  • Ported and updated legacy mission plugins for next-generation 802.11 collection systems

Expert Qualifications

  • Specialized training in OSX and iOS internals through industry-recognized reverse engineering coursework
  • Extensive cooperative experience with federal government agencies specializing in security and defense
  • Recognized expertise in mobile application reverse engineering, wireless protocol analysis, and embedded systems security
  • Proficient in professional-grade tools including IDAPro, LLDB, Wireshark, and ARM64 assembly analysis