Software engineer, computer forensic investigator, offensive security consultant and researcher.
Designed, developed, and supported software and hardware systems for computer forensics and information security procedures and techniques.
Offensive security risk analysis, vulnerability assessment, penetration testing, social engineering, secure system architecture, security policies, wireless network security, and incident response.
Skills
Engineering, personal and team software processes, project management, interface design, security architecture.
Lead and manage development teams through requirements gathering, design, development, testing, deployment, and support.
Experience with technical, social, and physical security assessment.
Investigative practices, integration, research & development.
Education
2010-2012 Monmouth University Master of Science in Software Engineering
2005-2010 Monmouth University Bachelor of Science in Software Engineering
Experience
2007-present CyanLine, LLC - Eatontown, NJ
Member of Technical Staff
Engineered software & hardware computer forensic & network security products.
Assisted and led consulting work in computer forensics and network security.
Handled multiple file recovery cases where data was assumed to be lost on disk.
Performed forensic acquisitions to support both file recovery and computer usage analysis.
Prepared and submitted reports to the court on findings from computer analysis.
Developed computer forensic analysis systems.
Developed tools which deploy techniques for tracking hackers.
Representative Work
Researched, designed, and developed embedded Linux forensic acquisition system.
Managed multiple engineering projects while performing consulting work in forensics and network security.
Multiple Network Security Audits performing internal and external vulnerability assessment, penetration testing, antivirus evading payload development and deployment, and social and physical engineering at private businesses, banks, and law firms.
Multiple forensic cases including, but not limited to, proprietary data removal, proprietary data movement analysis, email analysis, and system restoration.
Summary
Software engineer, computer forensic investigator, offensive security consultant and researcher. Designed, developed, and supported software and hardware systems for computer forensics and information security procedures and techniques. Offensive security risk analysis, vulnerability assessment, penetration testing, social engineering, secure system architecture, security policies, wireless network security, and incident response.
Skills
Engineering, personal and team software processes, project management, interface design, security architecture. Lead and manage development teams through requirements gathering, design, development, testing, deployment, and support. Experience with technical, social, and physical security assessment. Investigative practices, integration, research & development.
Education
2010-2012 Monmouth University Master of Science in Software Engineering 2005-2010 Monmouth University Bachelor of Science in Software Engineering
Experience
2007-present CyanLine, LLC - Eatontown, NJ Member of Technical Staff
Engineered software & hardware computer forensic & network security products. Assisted and led consulting work in computer forensics and network security. Handled multiple file recovery cases where data was assumed to be lost on disk. Performed forensic acquisitions to support both file recovery and computer usage analysis. Prepared and submitted reports to the court on findings from computer analysis. Developed computer forensic analysis systems. Developed tools which deploy techniques for tracking hackers.
Representative Work
Researched, designed, and developed embedded Linux forensic acquisition system. Managed multiple engineering projects while performing consulting work in forensics and network security. Multiple Network Security Audits performing internal and external vulnerability assessment, penetration testing, antivirus evading payload development and deployment, and social and physical engineering at private businesses, banks, and law firms. Multiple forensic cases including, but not limited to, proprietary data removal, proprietary data movement analysis, email analysis, and system restoration.