Senior security engineer with extensive experience in embedded software development, vulnerability research, and reverse engineering expertise. Specializes in ARM TrustZone secure boot implementations, Trusted Execution Environments, and identifying critical vulnerabilities in networking devices, authentication systems, and embedded platforms.

Technical career includes senior positions at several specialized technology companies, major government contractors, and independent security consulting firms. Deep expertise in static and dynamic reverse engineering across x86, ARM, and MIPS architectures, with proven track record in kernel-level vulnerability analysis and source code review for complex technical disputes.

Career Highlights

  • Senior Software Engineer at a specialized technology company, developing embedded system software and reverse engineering binaries across Linux, Android, and ARM platforms including TrustZone components
  • Principal Vulnerability Researcher at a major government contracting firm, analyzing embedded network devices and vulnerability assessment across x86, ARM, and MIPS architectures
  • Senior Software Engineer at a major defense contractor, implementing Linux kernel drivers and optimizing DSP algorithms for radar systems
  • Security Consultant at an independent security consulting firm, conducting penetration testing and vulnerability analysis of hardware and software systems
  • Software Engineer at a security systems company, contributing to SELinux policy compiler and high-assurance platform implementation
  • Roboticist at an autonomous vehicle technology company, reverse engineering vehicle CAN bus protocols and autonomous vehicle control systems

Expert Qualifications

  • Retained as consulting expert in patent litigation involving video encoding and decoding technology in federal patent proceedings, performing source code review and technical analysis
  • Served as consulting expert in patent litigation involving medical device authentication systems in federal court, conducting reverse engineering analysis of authentication software
  • Extensive expertise in kernel-level vulnerability identification, source code analysis for intellectual property disputes, and complex technical testimony