About
Security researcher and engineer interested in malware reverse engineering, security-at-scale, and the human links in the security chain.
Ask me about
Work experience
- March 2021 – present
Canva
Sr. Security Engineer - August 2015 – February 2021
Amazon
Security Engineer - April 2014 – August 2015
Tier-3 Pty Ltd
Security Engineer - March 2011 – September 2013
Aerospace Corporation
Cyber Security EngineerThe Aerospace Corporation is a private, non-profit organization whose focus is to conduct research and provide support for scientific and engineering activities of the United States Government, most notably independent technical and scientific research, development, and advisory services to national security space programs. These customers, such as the United States Air Force and NASA, depend heavily on the expertise provided by the wide variety of technical experts employed by Aerospace. Aerospace employs engineers, scientists and SMEs from all disciplines, with 2/3 of it's workforce holding a Master's degree or greater. In my position at Aerospace, my key job responsibilities included: *Interpret and analyze government policy and guidance for impact on space system acquisition and engineering. *Guide customers through the process of incorporating DoD and other government Information Assurance policy and requirements into space system acquisitions. *Provide the customer with technical expertise in the evaluation of contractor engineering products. *Participate in working groups and engineering teams to address IA system and technology issues. *Provide consultation in the areas of computer, network, and communications security technologies. *Maintain cutting edge skills in cyber security and knowledge of current security trends and weaknesses. In particular, my achievements included: *Presentation at the Malware Technical Exchange Meeting regarding malware in flight software. *Authored security policy documents for Aerospace customers. *Participated in creation and establishment, and operation of the Cyber Attack Research Lab (CARL). *Performed security engineering reviews and DIACAP package reviews. *Researched and improved techniques in static binary reverse engineering and analysis for educational and engineering purposes. *Authored technical documents on password cracking for internal training. *Co-author of a patent for securing the MIL-STD-1553 bus protocol. - September 2008 – February 2011
Naval Postgraduate School
StudentMasters degree in Computer Science with an emphasis in Information Security - November 2006 – September 2008
DMDC
Consortium Student- CAC Test Lab
Education
- 2008 – 2010GSOIS, Information Assurance
- 2004 – 2008BS TMAC, Computer Science