Do you want to learn reverse engineering? Learn how executable binaries are constructed and assembled via Ghidra!

Join my Slack Ghidra community.

Join Community

Skills

Source Code Audits

A software code audit is a comprehensive analysis of source code in a programming project with the intent of discovering bugs, security breaches or violations of programming conventions.

Medical Device Hacking

Experience in finding vulnerabilities in devices like power-wheelchairs, fitbits, pacemakers, and more.

Presenting

Enjoys public speaking at information security events. Presented at DEFCON, GeekPWN, Kaspersky SAS and counting…

NodeJS

Built webapps using the latest backend webstacks

React

Built webapps using the latest frontend webstacks

Cloud Providers

Experience deploying web based applications to a cloud hosting provider such as AWS and Heroku

Experience

 
 
 
 
 

Chief Information Security Officer

Risktronics

Jun 2019 – Present Cluj, Romania
Risktronics is a cybersecurity company based in Cluj (Romania), focused on Vulnerability Research & Penetration Testing
 
 
 
 
 

Chief Executive Officer

Omega Intelligence & Security Solutions

Dec 2016 – Nov 2019
 
 
 
 
 

Cyber Security Consultant

Self-Employed

Dec 2016 – Present
 
 
 
 
 

Contract Software Engineer

SpiderOak

Jun 2016 – Dec 2016
SpiderOak’s new product Semaphor uses my libsodium-go library. Semaphor is an open sourced alternative for Slack
 
 
 
 
 

Computer Security Intern

Metropolitan State University of Denver

May 2014 – Dec 2016
 
 
 
 
 

Customer Service Representative

Metropolitan State University of Denver

May 2012 – Dec 2014

Volunteer Experience

IEEE Member

I’m in the working group: IEEE P2733, Standard for Clinical Internet of Things (IoT) Data and Device Interoperability with TIPPSS.

This standard establishes the framework with TIPPSS principles (Trust, Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things (IoT) data and device validation and interoperability. This includes wearable clinical IoT and interoperability with healthcare systems including Electronic Health Records (EHR), Electronic Medical Records (EMR), other clinical IoT devices, in hospital devices, and future devices and connected healthcare system.

CTO Member

Currently acting on the board. I handle all technology concerns and upgrades.

Solid State Depot is Boulder’s Hackerspace: a physical place where like-minded people get together and collaborate on creative projects. We were founded in July 2010 and moved into our first space a few months later in November. Sometimes referred to as a Makerspace, Makershop, or shared workspace, the Boulder Hackerspace is a space which functions as both a workshop and a place to hold our meetings. Here we explore art and technology and support each other in developing creative ideas/plans/toys/inventions/madness!

Accomplish­ments

Certified Bitcoin Professional - CBP

A Certified Bitcoin Professional is knowledgeable about the Bitcoin blockchain, Bitcoin transactions, and how the Bitcoin network operates. CBPs are able to apply Bitcoin technology to their professional area of expertise and understand privacy aspects, double-spending, and other issues that relate to the currency.
See certificate

Grow with Google - Intermediate Mobile Web Track Scholarship

A way to focus your skills by taking specialized Udacity courses. The top 10% will have access to jobs and networking opportunities.

Kaspersky SAS 2017 Presenter

Power-wheelchairs could potentially infect anything in their path, leading to global fear that any device can be hacked and be used against anyone. Chairs are excellent malware vectors because they have Bluetooth which allows to attack nearby devices. Crafty internet access can be achieved using 6LoWPAN, so one can download new exploits to the chair’s memory. Then use those exploits against any kind of Bluetooth-enabled device. Chairs are recent IoT devices and they can hide exploits in plain sight. Presented possible ways to implement malware in chairs.

Geekpwn 2016 Presenter

I presented more attacks and overall security of power-wheelchairs
See certificate

DEFCON 24 IoT Village presenter: Hot Wheels: hacking electronic wheelchairs

I reverse engineered a closed and proprietary protocol that relied on the CAN standard called R-Net for power wheelchairs. I showed how easy it was to inject standard CAN messages to take full control of chairs with R-Net electronics. I provided some basic open source tools to allow people to customize their chairs more easily.
See certificate

Recent Posts

The next generation of hacking tools using blockchains: part 1

The Internet is an ocean of data which is an advantage as well as a disadvantage. Pros are that the internet is free and accessible to …

Over the last few months I have been working on an smart assistant. Description: The Naomi Project is an open source, technology …

A friend wanted me to look at some bad crypto code he found recently. It was floating around the internet and Reddit until the the blog …

Contact