About | cpuinfo
Home About
About
Cancel

About

Professional Skills:

  • Android Application Threat Analysis
  • Android Application Security Assessment
  • Experience with static and dynamic analysis of malicious binaries
  • Performing reverse engineering of binary images for embedded systems
  • Analyzing software for vulnerabilities and security weaknesses
  • Expert with analyzing and disassembly of x86, x64, ARM32 binaries
  • Thorough understanding of Linux Internals
  • Embedded software development using assembly and C languages
  • Extract malware configuration files and IOCs
  • Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers
  • Conduct reverse-engineering for known and suspected malware files. Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration
  • Provide detailed reports of any findings. Performs research in the area of malicious software, vulnerabilities, and exploitation tactics. Identify vulnerabilities in binaries, identify and analyze shell-code, and recommend preventative or defensive actions
  • Analyze shellcode, and packed and obfuscated code, and their associated algorithms
  • Experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or equivalent software and dynamic analysis of software binaries using OllyDbg, WINDbg, or equivalent software
  • Published research papers at conferences or through other mediums (blogs, articles)
  • Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and Open Source (OllyDbg, Radare, GDB, etc.) tools and methods to perform software and malware reverse engineering investigations
  • Experience analyzing malicious desktop, mobile and web applications developed in common programing languages such as x86/x86-64 Assembly, ARM, C, C++, C#, Visual Basic, PowerShell, Ruby, Python, ActionScript, ASP, Java, JavaScript, HTML, etc
  • Research new and upcoming threats with the aim to develop defensive measures, detection policies and educational literature to inform the community
  • Knowledge of disassemblers, and fuzzing frameworks