About
Professional Skills:
- Android Application Threat Analysis
- Android Application Security Assessment
- Experience with static and dynamic analysis of malicious binaries
- Performing reverse engineering of binary images for embedded systems
- Analyzing software for vulnerabilities and security weaknesses
- Expert with analyzing and disassembly of x86, x64, ARM32 binaries
- Thorough understanding of Linux Internals
- Embedded software development using assembly and C languages
- Extract malware configuration files and IOCs
- Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers
- Conduct reverse-engineering for known and suspected malware files. Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration
- Provide detailed reports of any findings. Performs research in the area of malicious software, vulnerabilities, and exploitation tactics. Identify vulnerabilities in binaries, identify and analyze shell-code, and recommend preventative or defensive actions
- Analyze shellcode, and packed and obfuscated code, and their associated algorithms
- Experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or equivalent software and dynamic analysis of software binaries using OllyDbg, WINDbg, or equivalent software
- Published research papers at conferences or through other mediums (blogs, articles)
- Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and Open Source (OllyDbg, Radare, GDB, etc.) tools and methods to perform software and malware reverse engineering investigations
- Experience analyzing malicious desktop, mobile and web applications developed in common programing languages such as x86/x86-64 Assembly, ARM, C, C++, C#, Visual Basic, PowerShell, Ruby, Python, ActionScript, ASP, Java, JavaScript, HTML, etc
- Research new and upcoming threats with the aim to develop defensive measures, detection policies and educational literature to inform the community
- Knowledge of disassemblers, and fuzzing frameworks