👾Jonathan 👾

DevOps Engineer

Washington, DC, United States15 yrs 5 mos experience
Highly Stable

Key Highlights

  • Expert in malware analysis and reverse engineering.
  • Proven track record in cybersecurity education and community building.
  • Strong experience in penetration testing and vulnerability assessments.
Stackforce AI infers this person is a Cybersecurity Specialist with a focus on Malware Analysis and Threat Intelligence.

Contact

Skills

Core Skills

Malware AnalysisPenetration TestingSecurity AssessmentsCybersecurity EducationCommunity BuildingThreat IntelligenceThreat Analysis

Other Skills

Reverse EngineeringCI/CD IntegrationCTF DevelopmentSecurity TrainingVulnerability IdentificationCTF Platform DevelopmentCommunity EngagementAutomationInfrastructure OptimizationWeb DevelopmentCommunity ManagementPacket AnalysisVulnerability ResearchNetwork MappingThreat Hunting

About

As a dedicated cybersecurity professional, I specialize in protecting the digital landscape by dissecting malware, uncovering vulnerabilities, and fortifying defenses, with deep hands-on experience in Android mobile security and dynamic instrumentation. With a strong foundation in Malware Analysis and growing expertise in Mobile & Web Pentesting, I pair reverse engineering with device-lab workflows (rooted Android, ADB, frida-server) to analyze app behavior, harden controls, and accelerate triage across builds. Whether it’s unraveling the intricate layers of malware or testing the resilience of web and mobile applications, the focus is on turning insights into action with repeatable tooling and clear remediation guidance. If you’re shipping apps and want pragmatic, automation-first security that fits your delivery cadence, let’s connect and explore quick wins.

Experience

15 yrs 5 mos
Total Experience
3 yrs 4 mos
Average Tenure
1 yr 9 mos
Current Experience

Infophreak

2 roles

Security Engineer

Aug 2024 – Present · 1 yr 9 mos

  • Conducted security assessments on web applications, Android apps, APIs, and cloud environments, identifying critical vulnerabilities including XSS, SQLi, IDOR, and misconfigured access controls.
  • Reverse engineered Android APKs to bypass root detection, analyze insecure storage practices, and uncover hidden endpoints using tools like Androguard and JADX.
  • Built and deployed custom CTF challenges simulating real-world attack vectors to train community members and assess secure development practices.
  • Integrated SAST/DAST tools (SonarQube, Snyk, Checkov) into CI/CD pipelines via GitHub Actions and Jenkins, enabling continuous security testing for lab projects.
  • Executed manual and automated penetration tests using Burp Suite, OWASP ZAP, Frida, MobSF, Postman, SQLmap, Apktool, and JADX.
  • Developed and maintained infrastructure-as-code security scanning with Terraform and Checkov, detecting misconfigurations and enforcing cloud security standards.
  • Utilized Ghidra’s Android analysis modules to decompile Dalvik bytecode and ARM/ELF binaries, accelerating reverse-engineering of APKs and shared libraries.
  • Wrote and optimized YARA rules for mobile malware families and PUPs.
Security AssessmentsMalware AnalysisReverse EngineeringPenetration TestingCI/CD Integration

Director of Development

Oct 2023 – Present · 2 yrs 7 mos

  • Helped with the design, development, and maintenance of Infophreak’s cybersecurity learning infrastructure, including the website, CTF platform, and community collaboration tools.
  • Architected a secure, scalable CTFd environment tailored for hands-on hacking challenges and integrated it with Discord for seamless event management and real-time updates.
  • Developed custom automation and bot integrations to enhance collaboration, streamline project workflows, and improve participant engagement across the Infophreak community.
  • Drove platform scalability and security by optimizing infrastructure performance, ensuring uptime, patch management, and data protection best practices.
  • Spearheaded the creation of CTF challenges and simulated attack scenarios to sharpen participant skills in web application security, network security, and reverse engineering.
  • Fostered a diverse and inclusive learning community, promoting mentorship programs, hands-on workshops, and knowledge-sharing initiatives within the InfoSec space.
  • Played a key role in establishing Infophreak as a recognized hub for cybersecurity education, attracting new members, contributors, and partnerships.
  • Implemented continuous system improvements based on user feedback, strengthening the learning experience and aligning platform growth with community needs.
  • Supported ethical hacking education by leading community CTF competitions and real-world challenge development to foster critical thinking and security problem-solving skills.
  • Championed a culture of collaboration, continuous learning, and security excellence, helping members transition from enthusiasts to skilled cybersecurity professionals.
CTF Platform DevelopmentCommunity EngagementAutomationInfrastructure OptimizationCybersecurity EducationCommunity Building

Bank of america

2 roles

Malware Prevention Reverse Engineer

Aug 2022 – Aug 2024 · 2 yrs

  • Collaborated within a Malware Prevention sub-team dedicated to reducing risk across Bank of America’s global infrastructure through advanced malware analysis, threat actor tracking, and reverse engineering of malicious code.
  • Conducted in-depth static and dynamic malware analysis while assisting with proactive threat hunting and containment of malicious activities across critical assets.
  • Developed custom automation tools to streamline malware analysis workflows, accelerating turnaround times on high-priority escalations and safeguarding business operations.
  • Tracked threat actors and mapped malicious infrastructure to provide actionable intelligence that strengthened proactive defense strategies.
  • Reverse-engineered malware samples to extract indicators of compromise, uncover persistence techniques, and identify credential theft and data exfiltration methods.
  • Authored detailed malware analysis reports on a daily basis, delivering insights into attacker behavior, communication techniques, and exploitation methods to operational security teams.
  • Monitored and tracked ongoing malware campaigns, including banking trojans, ransomware, and nation-state threats, identifying emerging trends and threat patterns to support early disruption efforts.
  • Automated stages of malware triage, unpacking, and configuration extraction to enhance the overall efficiency of the malware analysis process.
  • Managed over 100 high-priority escalations, analyzing malicious files, suspicious websites, and advanced threats to drive immediate risk mitigation actions.
Malware AnalysisThreat HuntingAutomationThreat Intelligence

Cyber Security Engineer

Aug 2022 – Aug 2024 · 2 yrs

  • Managed over 100 high-priority escalations, analyzing malicious files, phishing payloads, and compromised websites using Crowdstrike Falcon, Proofpoint TAP, and Splunk.
  • Conducted advanced malware analysis and reverse engineering utilizing Ghidra, Trellix Malware Analysis Dashboard, CyberChef, and Tria.ge, providing actionable reports to operational teams.
  • Monitored malicious campaigns such as EvilProxy and threat actors through DomainTools Iris Investigate, Splunk, and Proofpoint TAP, supporting proactive threat mitigation.
  • Developed custom automation scripts to optimize malware triage, unpacking, and C2 configuration extraction, enhancing analysis efficiency.
  • Reverse engineered malware written in C, C++, and .NET to identify persistence mechanisms, and C2 communication tactics.
  • Supported bank-wide risk reduction by identifying novel malware infrastructure, assisting in threat containment, and strengthening endpoint defenses.
Malware AnalysisThreat DetectionReverse EngineeringThreat Intelligence

Ironnet

2 roles

Threat Analyst

Jun 2022 – Jul 2022 · 1 mo

  • Conducted in-depth analysis of Command and Control (C2) servers to identify malicious activity, including unauthorized beaconing, lateral movement indicators, and covert communication channels.
  • Developed and optimized targeted detection queries using Splunk and OpenSearch to ensure effective monitoring and visibility across diverse network platforms.
  • Analyzed query results using Splunk dashboards to identify additional use cases, such as anomaly detection for early-stage malware campaigns.
  • Developed advanced hunt queries for OpenSearch to detect evolving C2 frameworks and enhance collective defense strategies across partner organizations.
C2 AnalysisDetection QueriesThreat Analysis

Cyber Security Analyst

Jun 2022 – Jul 2022 · 1 mo

  • Conducted in-depth analysis of Command and Control (C2) servers to identify malicious activity, including unauthorized beaconing, lateral movement indicators, and covert communication channels.
  • Developed and optimized targeted detection queries using Splunk and OpenSearch to ensure effective monitoring and visibility across diverse network platforms.
  • Analyzed query results using Splunk dashboards to identify additional use cases, such as anomaly detection for early-stage malware campaigns.
  • Developed advanced hunt queries for OpenSearch to detect evolving C2 frameworks and enhance collective defense strategies across partner organizations.
  • Enhanced threat detection by developing Splunk/OpenSearch queries that uncovered C2 traffic and novel malware campaigns, cutting mean detection time by 30%.
C2 AnalysisDetection QueriesThreat Analysis

Binary defense

Teaching Assistant (Volunteer)

Jan 2022 – Mar 2022 · 2 mos · Remote

  • This class is designed for technical security personnel who wish to gain skills in
  • reverse-engineering malicious software for Windows operating systems. Although no
  • prior experience is required to take the class, students who have some programming
  • experience in C or another language will find it easiest to participate fully. The class
  • will focus on disassembly analysis of compiled 32-bit DLL files written in C but may
  • also touch on scripting languages such as PowerShell and Visual Basic that are used to
  • deliver compiled malware payloads. Students will learn practical analysis and report
  • writing techniques to pull the most useful information out of malware that can help
  • inform threat hunting and detection engineering efforts and communicate that
  • information effectively.
  • During the course of this class, learners will have the opportunity to gain the following
  • skills:
  • [✔] Run DLL files from the command line using rundll32.
  • [✔] Using IDA Free 7, perform static code analysis of a very simple DLL file and
  • explain its purpose.
  • [✔] Using x32dbg, set breakpoints and step through running the instructions of a
  • simple DLL file via rundll32.
  • [✔] Create a Microsoft 365 Developer Tenant (free) for testing MS Teams, etc.
  • [✔] Use vcpkg to install static libraries for Libcurl and cJSON in Visual Studio 2019
  • [✔] Modify the C code of a simple DLL project to send a simple message through
  • Microsoft Teams via a webhook URL.
  • [✔] Using IDA Free and x32dbg, analyze the new version of the DLL and find the
  • instructions responsible for network connections.
  • [✔] Using C source code provided by the instructor, modify the DLL project to be a
  • typical Remote Access Trojan (RAT) capable of running commands, listing files
  • and processes, and reporting the output to a Command-and-Control server.
  • [✔] Modify the DLL to allow execution using rundll32, regsvr32, and msiexec.
  • AND ALOT MORE!

Confidential

Security Consultant

Nov 2020 – Jun 2022 · 1 yr 7 mos

  • Develop content for the clients' Cybersecurity training platform which
  • is used to educate its users on various cybersecurity topics. My main
  • focus is dealing with malware analysis, computer science concepts, and
  • reverse engineering. I have covered topics such as:
  • [✔] Static and dynamic malware analysis tools and techniques such as
  • how to properly set up a virtual lab, how to properly handle malware
  • and how to track down a C2 server, and more.
  • [✔] Unpacking malware samples.
  • [✔] How to identify IOCs and conduct threat intel with sites like
  • AlienVault.
  • [✔] Discussing the basics of Intel x86 architecture such as registers,
  • instructions, along with the stack and heap.
  • [✔] Discussing different TTPs and the threat actors that use them such as
  • MITRE ATT&CK technique T1547.001 (Boot or Logon Autostart
  • Execution)
  • [✔] Has experience with technical writing and explaining complex
  • security topics and a simplistic and detailed manner.
  • [✔] Has experience with ticketing software such as JIRA and Confluence
  • in an enterprise setting
Cybersecurity Training Content DevelopmentCybersecurity Education

The home depot

Millwork

Oct 2020 – Nov 2021 · 1 yr 1 mo

I.a.a.n security

2 roles

Blogger

Sep 2020 – Oct 2024 · 4 yrs 1 mo

  • I write technical blogs on my site about the things I've learned throughout my journey into cybersecurity.

Security Enthusiast

May 2019 – Oct 2022 · 3 yrs 5 mos

  • [✔] Has experience conducting vulnerability assessments using Nessus on
  • my home networking and researching how to fix those vulnerabilities.
  • [✔] Has experience using Google Dorking to gather intel on a target
  • during OSINT, IMINT, GEOINT and reconnaissance.
  • [✔] Has some red team experience working with Kali Linux tools like
  • NMAP to conduct reconnaissance on a network and Metasploit to
  • learn how vulnerabilities are exploited on a target system.
  • [✔] Has experience developing and automating security tools with
  • Python and C#, some of my projects include "Malware Sample
  • Downloader" (A web scraper used during malware analysis to
  • automatically download samples from a sourced link), "Pylogger" (A
  • PoC Python Keylogger and Downloader Trojan), "Pyhasher" (An
  • automated file hasher used to create, MD5, SHA256, SHA512 of files and
  • test them against the VirusTotal API.
  • [✔] Has malware analysis experience and conducting static and dynamic
  • analysis, such as identifying IOCs, manually unpacking malware,
  • reverse engineering an understanding of the C programming language
  • along with anti-debugging and obfuscation methods and writing YARA
  • rules.
  • [✔] Gained experience working with Splunk during the RangeForce Blue
  • Team Star Competition where I learned how to monitor system activity
  • and spot suspicious user activity such as brute-force attack.
  • [✔] Has experience working with Type 1 hypervisors such as VMware
  • ESXi and Proxmox
  • [✔] Has an understanding of networking concepts such HTTP, TCP/IP and
  • the OSI model.
  • [✔] Currently learning firewalls rules and IDS/IPS with pfSense, Snort, and
  • Suricata.

Tryhackme

Level 0x9

Sep 2020 – Aug 2025 · 4 yrs 11 mos

  • Learning the fundamentals of Red / Blue Team Penetration Testing
  • [✔] Experience doing Packet Analysis with Wireshark
  • [✔] Has conducted vulnerability research/assessment (MITRE ATT&CK, Nessus)
  • [✔] Experience with Google Dorking
  • [✔] Understands Linux fundamentals
  • [✔] Experience mapping networks with NMAP
  • [✔] Experience exploiting vulnerabilities with Metasploit
  • [✔] Experience developing and automating security tools with Python and C#
  • [✔] Understands HTTP fundamentals
  • [✔] Understands Networking Concepts (TCP/IP - OSI)
  • [✔] Experience conducting Static and Dynamic Malware Analysis
  • [✔] Experience with XSS
  • [✔] Experience with SIEM (Splunk)
  • [✔] Has experience with OSINT, IMINT, GEOINT, and Reconnaissance
  • [✔] Front-End Development (Javascript, React)
  • [✔] Solid understanding of Programming Fundamentals
  • [✔] Experience with Technical Writing
  • [✔] Experience with JIRA and Confluence
  • Topics in progress:
  • [✔] Malware Analysis
  • [✔] Digital Forensics
Packet AnalysisVulnerability ResearchNetwork MappingPenetration Testing

Kenzie academy

Coding Bootcamp Student

Oct 2019 – Jan 2020 · 3 mos

  • Learned the fundamentals of front-end web development along with back-end technologies such as Node.js, APIs, and other web development concepts.

Family dollar

Cashier

Jun 2019 – Oct 2020 · 1 yr 4 mos

The laurel regional hospital foundation inc

Information Technology Technician

Jul 2015 – Jul 2016 · 1 yr

  • Jr. Assistant IT Technician

Food lion

Cashier

Jun 2015 – Jun 2019 · 4 yrs

Laurel municipal center

Information Technology Technician

Jun 2014 – Aug 2014 · 2 mos

  • Jr. Assistant IT Technician

Self-employed

Music Producer

Dec 2010 – Oct 2020 · 9 yrs 10 mos · Greater Los Angeles Area

Education

Kenzie Academy

Computer Software Engineering

Jan 2019 – Jan 2020

TCM Security

Practical Malware Analysis & Triage

Stackforce found 100+ more professionals with Malware Analysis & Penetration Testing

Explore similar profiles based on matching skills and experience