Computer engineer and information security expert specializing in the secure design of embedded computing devices and their networks. White hat hacker who uses penetration testing, reverse engineering techniques, and disassemblers such as IDA Pro to identify and close security holes in mobile, embedded, and cloud computing systems to prevent hacking and cyberattacks. With substantial engineering design experience from the hardware level up through the entire software stack, has designed and developed FPGAs in VHDL, debugged electronics with oscilloscopes and logic analyzers, developed firmware in C and assembly for real-time operating systems, developed low-level device drivers for Linux and Windows, developed custom networking protocols, developed GUIs in high-level languages, and developed web-based applications using a range of web technologies. Holds a security clearance and has consulted within the U.S. intelligence community.

Formal Education

  • M.S. in Electrical and Computer Engineering, Johns Hopkins University
  • B.S. in Computer Engineering, Messiah College

Career Highlights

  • Founded a collaborative, cloud-based reverse engineering platform capable of disassembling binary software including malware
  • Designed and developed features for the disassembler across the full stack of software components from backend (Django/Python/C) to web frontend (JavaScript/Angular/CSS)
  • Certified Forensic Analyst, Penetration Tester, and Cisco CCNA
  • Performed vulnerability research and software security audits on optical and copper networking devices
  • Conducted software security audits of SCADA electrical power critical infrastructure systems, including development of proof-of-concept hacks to demonstrate the severity of uncovered weaknesses as well as advisement of available risk mitigations
  • Reverse engineered proprietary network protocols and developed Wireshark dissectors to parse them to identify security weaknesses in the protocols and develop proof-of-concept attack simulations
  • Designed and developed a portable architecture for a non-multitasking kernel comprising a device driver framework, network stack, and filesystem ported to a variety of embedded networking platform
  • Developed and deployed fuzzers against networking platforms to identify potential security weaknesses in protocol implementations
  • While a computer engineer for the U.S. Navy, developed a variety of Windows and mainframe-based applications in C, C++, C#, and Visual Basic to support the infrastructure of a flight simulation laboratory and integrated radar and infrared image generators with aircraft avionics