Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Curriculum Vitae cory@cryptfold.com

Summary

Software engineer, computer forensic investigator, offensive security consultant and researcher. Designed, developed, and supported software and hardware systems for computer forensics and information security procedures and techniques. Offensive security risk analysis, vulnerability assessment, penetration testing, social engineering, secure system architecture, security policies, wireless network security, and incident response.

Skills

Engineering, personal and team software processes, project management, interface design, security architecture. Lead and manage development teams through requirements gathering, design, development, testing, deployment, and support. Experience with technical, social, and physical security assessment. Investigative practices, integration, research & development.

Education

2010-2012 Monmouth University Master of Science in Software Engineering 2005-2010 Monmouth University Bachelor of Science in Software Engineering

Experience

2007-present CyanLine, LLC - Eatontown, NJ Member of Technical Staff

Engineered software & hardware computer forensic & network security products. Assisted and led consulting work in computer forensics and network security. Handled multiple file recovery cases where data was assumed to be lost on disk. Performed forensic acquisitions to support both file recovery and computer usage analysis. Prepared and submitted reports to the court on findings from computer analysis. Developed computer forensic analysis systems. Developed tools which deploy techniques for tracking hackers.

Representative Work

Researched, designed, and developed embedded Linux forensic acquisition system. Managed multiple engineering projects while performing consulting work in forensics and network security. Multiple Network Security Audits performing internal and external vulnerability assessment, penetration testing, antivirus evading payload development and deployment, and social and physical engineering at private businesses, banks, and law firms. Multiple forensic cases including, but not limited to, proprietary data removal, proprietary data movement analysis, email analysis, and system restoration.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: