Rodrigo Branco

Advisor

Dallas, Texas, United States27 yrs 10 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over 20 years of experience in security research.
  • Led major security initiatives at top tech companies.
  • Organizer of Hackers to Hackers Conference for 21 years.
Stackforce AI infers this person is a Cybersecurity Expert with extensive experience in vulnerability research and exploit development.

Contact

Skills

Other Skills

Computer SecurityInformation Security ManagementNetwork SecurityFirewallsPenetration TestingIntrusion DetectionPublic SpeakingComputer ForensicsReverse EngineeringSecurity AuditsTraining DeliveryApacheUnixCheckpointServers

About

Rodrigo Rubira Branco (BSDaemon) is a Vulnerability Researcher and Exploit writer, currently holding a Chief Architect, Security Research position. Rodrigo is a proud advisor for Open Source Security Inc (creators of grsecurity) and BYOS. Rodrigo also held positions as Lead Security Researcher at L3 Harris Trenchant; led CPU and microarchitecture security research at Google; was responsible for native mitigations for Meta's family of apps, worked as a Senior Principal Engineer at Amazon Web Services (AWS) and before that, was the Chief Security Researcher of Intel Corporation. Rodrigo also held positions as Director of Vulnerability & Malware Research at Qualys and as Chief Security Research at Check Point where he released dozens of vulnerabilities in many important software. In 2011 he was honored as one of the top contributors of Adobe. Previous to that, he worked as Senior Vulnerability Researcher in COSEINC and as Staff Software Engineer in IBM's Advanced Linux Response Team (ALRT). Rodrigo organized Hackers to Hackers Conference (H2HC) for 21 years and presented research all over the world. Rodrigo is part of the technical committee for top security conferences, such as Offensive Con, LangSec, DistrictCon, IEEE SecDev. Specialties: Security & Vulnerability Researching, Operating System Internals, Software Exploitation, Malware Analysis

Experience

27 yrs 10 mos
Total Experience
4 yrs 7 mos
Average Tenure
15 yrs 10 mos
Current Experience

Dartmouth college

Hacker In Residence

May 2025Dec 2025 · 7 mos · United States

  • Engage with the students at the Institute for Security, Technology, and Society (ISTS) to guide security research work in a variety of themes.

Thallium security

Strategic Advisor

Feb 2023Present · 3 yrs 3 mos

L3harris technologies

Lead Security Researcher

Jan 2023Feb 2024 · 1 yr 1 mo · United States · Remote

Google

Senior Staff Engineer

Mar 2022Mar 2023 · 1 yr

  • Leading CPU and Microarchitecture security research

Open source security, inc.

Advisor

Jan 2022Present · 4 yrs 4 mos

Binarly, inc.

Strategic Advisor

May 2021Apr 2026 · 4 yrs 11 mos

Accuknox

Advisor

Dec 2020Nov 2024 · 3 yrs 11 mos

Amazon web services (aws)

Senior Principal Engineer

Jan 2020Mar 2022 · 2 yrs 2 mos · Remote

Byos

Strategic Advisor

Sep 2019Present · 6 yrs 8 mos

Intel corporation

Chief Security Researcher

Oct 2013Dec 2019 · 6 yrs 2 mos · Hillsboro

  • Founder of the team STORM (STrategic Offensive Research & Mitigations). Previously led the Core Client and BIOS Teams Security Teams.

University of illinois at urbana-champaign

Research Assistant

Jul 2013Dec 2013 · 5 mos · Urbana-Champaign Area

  • While doing my PhD, I received a tuition and support from the university to perform research in the field of computer security and to give classes on reverse engineering in different curriculums.

Cipher

R&D Director

Jan 2013Jul 2013 · 6 mos

  • Responsible for the Cipher Technology, Cipher Intelligence and Cipher Labs Teams
  • Coordinate the R&D and Innovation teams
  • Manage the Ethical Hacking Team that provides Penetration Test, Code Review and other high-level technology offers to customers

Qualys

Director of Vulnerability & Malware Research

Jul 2011Dec 2012 · 1 yr 5 mos

  • Lead the Security Research Initiatives in Qualys related to automated malware analysis and vulnerability finding, exploitation and understanding.

Dissect.pe

Founder | Researcher

Jul 2010Present · 15 yrs 10 mos

  • Dissect.pe is a malware research project, now in beta stage.
  • The idea of the project is to provide a free interface for malware analysis, similar to other existing projects, but with advances that will be announced when we start freely dissecting samples.
  • For now, the system has malware classification and is open for partnership with industry vendors and other projects for feed exchange.
  • The link for the project is: http://feeds.dissect.pe/

Coseinc

Senior Vulnerability Researcher

Nov 2008Jul 2010 · 1 yr 8 mos

  • COSEINC is a Singapore based and privately funded company dedicated to providing highly specialized information security services to our clients. Founded in 2004, we are a young and dynamic company whose constitution are computer security experts, from diverse backgrounds and geographies, with distinguished credentials and experience.
  • It is our aim to provide our clients with the most professional and competent expertise and services at the most reasonable rates so that they can achieve the highest returns on their information technology investment.
  • Organizationally, COSEINC is structured into 2 teams. They are the Advanced Malware Laboratory (AML) and the Vulnerability Research Laboratory (VRL).
  • As for the VRL, this team is focus on discovering inherent vulnerabilities in software either due to bad development or weak implementation. Basically software is created by humans, and to err is human. The VRL team is sub-divided into 2 sub-teams, namely the Windows sub-team and the Linux sub-team. Both sub-teams have published several findings.

Check point software technologies

Chief Security Research

Apr 2008Jul 2011 · 3 yrs 3 mos · Israel

  • Responsible for the Vulnerability Discovery Team (VDT)

Scanit middle east

Principal Security Researcher

Jan 2008Jan 2008 · 0 mo

  • Lead the vulnerability research initiatives in the company.

Hakin9 magazine

Top Reviewer and Author

Jan 2007Feb 2010 · 3 yrs 1 mo

  • Hakin9 is an important magazine in the IT Security Industry, with leading articles.
  • For Hakin9 I contributed with two articles (about Kernel Exploitation and Anti-Forensics and about IDS/IPS Evasion). Also, I was a top reviewer of articles approved for publication, giving feedbacks to the authors as well.

Sans institute

SANS Instructor Brazil

Nov 2006Dec 2009 · 3 yrs 1 mo

  • The first to bring the SANS trainings to Brazil during a Hackers to Hackers Conference (H2HC) I'm authorized to give the Cutting Edge Hacking Techniques, the Mastering Packet Analysis and the Exploitation classes.

Ibm

Staff Software Engineer

May 2006May 2008 · 2 yrs

  • Worked as a software Engineer at IBM, member of the Advanced Linux Response Team (ALRT), part of the IBM Linux Technology Center (IBM/LTC) Brazil also worked in the IBM Toolchain (Debugging) Team for Power Architecture.

Fgp - faculdade g&p

Professor of Operating Systems

Jan 2006Jul 2006 · 6 mos

  • University Professor for the Operating Systems class, focusing on the design of operating systems trying to bring together the academic focus with real-life experience.

Md systems networking

Senior Security and OpenSource Analyst

Jan 2005May 2006 · 1 yr 4 mos

  • Act as a leader in solution provide using opensource and with focus on security. The company is small-sized, but one of the main sellers of Citrix in the latin America, with many big customers.

Porto seguro

Senior Security Analyst

Jan 2005Jan 2006 · 1 yr

  • Developed solutions to automate security needs, participated in new projects definitions, taking care of the security design.

H2hc - hackers to hackers conference

Organizer Hackers to Hackers Conference

Jan 2004Present · 22 yrs 4 mos

  • We are organizing since 2004 a security conference called Hackers to Hackers Conference (H2HC).
  • This conference is increasing every year and is used as a powerful way of communication between high skilled security researchers in Brazil.
  • Many new techniques, tools and vulnerabilities have been presented during the conference years.
  • Also acting as a speaker, I presented about the follow topics:
  • Polymorphic attacks (where I presented the SCMorphism software that "automagically" generates polymorphic shellcodes)
  • Kernel Rootkits x Application Layer Firewalls (with real sample using ISA Server 2004)
  • Syscall Proxying || Pivoting (where I showed a framework to be PRELOADED permiting you run any program in your own machine but in fact it was translated to the analysed machine)

Rise security

Senior Security Researcher

Jan 2004Present · 22 yrs 4 mos

  • Organization founded in 2004 by three brazilian security researchers specialized in vulnerability research, exploit development, source code auditing, reverse engineering, intrusion detection and computer forensics. The main objective is to evolve, ethically sharing the results with the security community.

Scua

External Consultant

Jan 2002Nov 2004 · 2 yrs 10 mos

  • Helped in the new infra-structure of the SCUA Suite which provides Windows Desktop Security
  • Developed a Linux PoC of the SCUA Suite for a big RFP in the Brazilian Government
  • Participated in Security Consultancy engagements in SCUA customers

Cyclades

External Consultant

Jan 2002Jan 2004 · 2 yrs

  • Acted as an external consultant in Cyclades Brazil, giving trainings to partners and to support employees about the company equipaments and network in general.
  • Also, helped the development team in questions regarding Linux.

Firewalls security corporation

Security Architect

Jan 2000Jan 2005 · 5 yrs

  • Firewalls was founded to provide state-of-art security solutions to different customers needs. The idea was to act as an outsourced company for big vendors, achieving the best-in-class solution design without the need of all burocracy of a big company.
  • In the company I acted as the design and code of the custom-made solutions for many different customers. As the owner/founder I also had the opportunity to deal with many aspects of the business and grown in experience in understand the challenges behind a company.

Stationet

Sr. Security and OpenSource Researcher

Jul 1998Jan 2000 · 1 yr 6 mos

  • Acted in many different aspects of a new company starting to offer Linux and Security services.
  • Teacher in the trainings, consultant to many different companies and developer of internal tools to automation of the services.

Education

Oregon State University

Doctor of Philosophy (PhD) — Computer Engineering

Jan 2014Jan 2027

Instituto Tecnologico da Aeronautica - ITA

Master — Computer Engineering

Jan 2006Jan 2008

Instituto Tecnologico da Aeronautica - ITA

Specialization — Computer Security

Jan 2006Jan 2007

FGP

BS — Computer Security

Jan 2001Jan 2005

Universidade Estadual Paulista Júlio de Mesquita Filho

Technical — IT

Jan 1998Jan 2000

Colégio São José

High School

Jan 1991Jan 1998

Stackforce found 100+ more professionals with Computer Security & Information Security Management

Explore similar profiles based on matching skills and experience