Senior software engineer specializing in iOS security, WebKit vulnerability research, and 802.11 wireless protocol exploitation. Currently at a leading defense contracting firm, developing advanced CNO tools and iOS exploitation research capabilities. Previously at multiple major technology and defense companies, contributing to multi-threaded 802.11 collection systems modernization, ARM and custom processor firmware reverse engineering, and vulnerability discovery in wireless communication protocols.
Formal Education
- Master's of Engineering in Computer Engineering from a leading research university
- Bachelor of Science in Electrical Engineering and Mathematics from a top-tier research university
Career Highlights
- Led iOS exploitation research and CNO tool development at a leading defense contracting firm, focusing on WebKit and XNU kernel internals
- Architected and contributed to modernization rewrite of multi-threaded 802.11 collection systems
- Performed ARM and custom processor firmware reverse engineering to identify vulnerabilities in commercial hardware
- Developed vulnerability discovery capabilities for Wi-Fi and Bluetooth LE protocols in common devices
- Built automated testing systems enabling validation across multiple devices simultaneously
- Ported and updated legacy mission plugins for next-generation 802.11 collection systems
Expert Qualifications
- Specialized training in OSX and iOS internals through industry-recognized reverse engineering coursework
- Extensive cooperative experience with federal government agencies specializing in security and defense
- Recognized expertise in mobile application reverse engineering, wireless protocol analysis, and embedded systems security
- Proficient in professional-grade tools including IDAPro, LLDB, Wireshark, and ARM64 assembly analysis
