Job related pages:

Job seekers

2 active job seeker(s)

Contact details Profile summary Skills
Andrew Brandt, United States
Andrew Brandt is an expert in the field of malware analysis and network forensics, having worked in information security since 2005. Prior to that, he was an award winning investigative journalist.
I have been working in the field of malware research since 2005, when I was hired by Webroot as a member of their threat research team. During the six years I worked for that company, I spent about half of my time performing manual analysis of malware samples in order to support the antimalware signatures database used by the product; The other half of the time I worked with the marketing and PR team producing published and video content highlighting the research work by myself and my team, and presenting original research at conferences such as RSA, DefCon, and Blue Hat.

In 2011, I moved to Solera Networks, a big data forensics startup, and headed up their R&D operation until their acquisition by Blue Coat Systems in 2013. While at Solera and Blue Coat, I coordinated with engineering and SE groups to improve the workflow of the product and instruct internal and external people in how to conduct retrospective analysis. That carried on when Blue Coat was acquired by Symantec.
Jimmy Shah, United States
Mobile Antivirus / Anti-Malware Researcher w/ a decade of exp. with Mobile/ Embedded

I work in mobile/embedded systems security. If it's lighter than a car, has a microprocessor, and is likely to be a target it's probably my problem. :)
Mobile Security/Antivirus Researcher, specializing in analysis of mobile threats on existing platforms (J2ME , Symbian , Windows Phone , iOS , Android) and potential mobile malware and spyware. Gathering threat intelligence and sources. Regularly provides analysis and research on mobile threats to customers. Presenting on mobile threat research at computer security conferences.

Worked with: Symantec , McAfee , AVG , Zimperium

Specialties: Reverse engineering , malware analysis , computer security , media trained , mobile phones , IoT , embedded , telecom
« Previous 1 Next »