Services

I specialize in delivering the highest quality product security services available to discerning customers across the globe. Read more about me and my background in the portfolio. Below is a sampling of my most commonly delivered services.

Capabilities & Expertise

I have decades of experience in security engineering and offensive research. I’ve discovered and exploited critical flaws in a wide variety of targets ranging from operating system kernels and secure messaging apps, to real time communication stacks. Whether you’re hardening the device that will be in everyone’s pocket five years from now, or need to make sure your toasters don’t form a botnet that brings down the internet, I can help.


Security Architectrue & Engineering

Art Photo by Petter Lagson on Unsplash

While I have a lot of experience breaking things, I also love to build things. I believe that security is just a part of good engineering (and so is Quality and Safety). I love working with engineering teams from the ground up to help build awesome, resilient products.

Find out more about how I can help with your engineering and architecture needs in:

  1. Security Automation
  2. Software Hardening
  3. Architecture Advisory
  4. Vulnerability Mitigation

Security Analysis

Photo by Samsung on Unsplash

I’m extremely experienced in assessing software security and providing actionable results.

Find out more about how I can help you with:

  1. Vulnerability Research
  2. Penetration Testing
  3. Code Audit
  4. Architecture Review

Research & Development

Photo by Chris Liverani on Unsplash

I’m a researcher to my core. We love to develop custom tooling to discover vulnerability classes or binary program analysis, prove the exploitability of “non-exploitable” vulnerabilities, or study the efficacy of potential mitigations.

  • Reverse Engineering: I ❤️ binaries
  • Tool Development: Custom fuzzers, program analysis, TARA tooling, etc.
  • Exploit Development: Need a PoC to prove exploitability, or stable exploit for your red team?
  • Tailored Research: Tell me what you’re thinking and I’ll tell you if I’m a good fit!

Training

I offer private training in developing secure software and products. Each of my courses are tailored to your team’s needs. Contact me for more information!

Photo by Scott Graham on Unsplash


Something Else?

Have something in mind that you don’t see? Contact me! I excel at finding elegant solutions to exotic problems – often inventing new techniques along the way.