Jacob Williams

CTO

Odenton, Maryland, United States22 yrs 1 mo experience
Most Likely To SwitchAI Enabled

Key Highlights

  • Expert in building secure environments and risk management.
  • Prolific speaker and mentor in the infosec community.
  • Experienced in incident response and vulnerability remediation.
Stackforce AI infers this person is a Cybersecurity expert with a focus on risk management and incident response.

Contact

Skills

Core Skills

Machine LearningCyber Threat Intelligence (cti)Red Teaming

Other Skills

ProgrammingMalware AnalysisIntrusion DetectionPython (Programming Language)Software Defined RadioSCADAArtificial Intelligence (AI)Computer SecurityVulnerability AssessmentComputer ForensicsPenetration TestingVulnerability ScanningInformation AssuranceCEHCISSP

About

Infosec professional. Breaker of poorly written software. Incident responder. Digital defender. Business bilingual. I treat infosec like the Hippocratic Oath: First do no harm. I help business create secure environments that actually function by addressing realistic risk. I help penetration test organizations so they can find the weak spots before an attacker does. When an attacker does find a weak spot first, I work with them to remove the attacker, assess the damage, and remediate the vulnerabilities that allowed the attacker access in the first place. I'm a prolific conference speaker, an instructor, and an infosec mentor.

Experience

22 yrs 1 mo
Total Experience
4 yrs 10 mos
Average Tenure
8 yrs 2 mos
Current Experience

Hunter strategy

VP of R&D

Apr 2024Present · 2 yrs 1 mo · Remote

  • Joined Hunter Strategy as the VP of R&D and managing director of Hunter Labs. Working with Hunter to develop new product and service lines to give our clients the best possible cybersecurity outcomes.

Not sharing

Cybersecurity Research

Jan 2023Feb 2024 · 1 yr 1 mo · Remote

  • Doing some interesting application of machine learning to an exciting cybersecurity problem.
ProgrammingMachine Learning

Scythe

Executive Director of Cyber Threat Intelligence

Apr 2022Dec 2022 · 8 mos

  • Built out a new service line from the ground up, providing adversary emulation services to help streamline purple team services for clients.
Red TeamingProgrammingMalware AnalysisCyber Threat Intelligence (CTI)Intrusion Detection

Breachquest

Chief Technology Officer

Jun 2021Jan 2022 · 7 mos · Augusta, Georgia, United States

Ians

Faculty Member

Mar 2018Present · 8 yrs 2 mos

  • Provide decision support services and consulting engagements to various clients in multiple verticals. Clients range in size from Fortune 10 to medium-sized businesses. Consult on data protection, vulnerability management, and other security topics.
  • Serve on the executive engagement team to draft briefings and real-time emergency support calls during cybersecurity crisis periods.

Peerlyst

Vulnerability Review Board Member

Feb 2016Aug 2020 · 4 yrs 6 mos

  • Review vulnerabilities submitted through the SecureDrop system to vet them for accuracy. Assist vulnerability researchers in coordinating with vendors and media to communicate vulnerabilities in a responsible manner. Help ensure that vendors do not ignore vulnerabilities submitted by lesser known researchers.

Sans institute

2 roles

NewsBites Editorial Board

Jan 2016Dec 2022 · 6 yrs 11 mos

  • Write editorial comments for SANS NewsBites where we help infosec professionals understand what's important in infosec news developments twice a week. https://www.sans.org/newsletters/newsbites/

Instructor and Course Author

Jan 2012Dec 2019 · 7 yrs 11 mos

  • Currently involved in authoring the Malware Reversing course (FOR610) with Lenny Zeltser, the Memory Forensics course (FOR526) with Alissa Torres, the Cyber Threat Intelligence (FOR578) course with Robert M. Lee and the Advanced Exploit Development (SEC760) course with Stephen Sims.

Rendition infosec

Chief Technology Officer

Jan 2013Sep 2021 · 8 yrs 8 mos · Augusta, Georgia Area

  • Penetration testing, security assessment, incident response, digital forensics, and reverse engineering. I break the stuff other people build, then teach them how to build it better and more secure.

Csrgroup computer security consultants

Chief Scientist

Mar 2010Jan 2014 · 3 yrs 10 mos

  • Reverse engineer malicious software without the benefit of source code. Develop training for and consult with customers on computer security topics.

Hbgary, inc.

Malware Reverse Engineering Instructor

Mar 2010Jun 2013 · 3 yrs 3 mos

  • Teach students of varying skill levels to reverse engineer malicious software programs using HBGary Responder.

Dod

Vulnerability Analyst

Apr 2008Jul 2013 · 5 yrs 3 mos

Dell services

Senior Systems Engineer

Jan 2004Jan 2008 · 4 yrs · Augusta, GA

  • Design and implement distributed Linux and Solaris systems with some hooks into Windows systems providing auxiliary systems. Ensure multi-layer security. Develop applications to move data securely between network nodes using custom networking protocols. Harden systems to ensure adequate security. Audit systems for security violations.

Education

Nova Southeastern University

PhD candidate

Jan 2010Jan 2013

Capitol Technology University

MSIA — Information Assurance

Jan 2007Jan 2008

Stackforce found 100+ more professionals with Machine Learning & Cyber Threat Intelligence (cti)

Explore similar profiles based on matching skills and experience