- First DataSecurity Engineer, 2014 - presentDeveloped systems and software to assist in proactive fraud detection, through data analytics and mining the underground market. This product was delivered to other financial institutions as a service, with an estimated value of over 16 million dollars in revenue. Analyzed ongoing cyber threats, such as malware, vulnerabilities, threat actors, and campaigns to assess the potential impact to the firm, in addition to developing tailored software solution across the enterprise.
- JPMorgan Chase & Co.Software Developer, 2012 - 2014Developed systems that would perform static and dynamic malware analysis on submitted sample files to detect malicious payloads. Automated software deployment cycle to streamline rapid software development (CI). Designed and Engineered a self-service portal for secure credentials. Automated generating business intelligence, and resource management reports. This effort allowed management to re-allocate resources as needed per teams and projects.
- Syracuse UniversityTA, 2011 - 2014I taught Computer Science classes to freshmen and sophomores, as well as Math to engineers. Fun times. :( I miss college.
- Fallout Shelter
- Syracuse UniversityCS, 2010 - 2014Summa cum laude
Packet Capture – Android aplikacije na Google Playu
Packet capture/Network traffic sniffer app with SSL decryption. Not that feature rich as Wireshark yet, but it's a powerful debugging tool e
Aliens (Special Edition) - Movies & TV on Google Play
Get even more chills and thrills in the Special Edition of Aliens, featuring a custom intro from Academy Award®-winning Director James Camer
Harlock: Space Pirate - Movies & TV on Google Play
2977: For many years a mighty battle has been raging across the galaxies as 500 billion humans, whose forebears were exiled from Earth, plan
Python, Pitch shifting, and the Pianoputer - __del__( self )
Record a sound, change its pitch 50 times and assign each new sound to a key of your computer keyboard. You get a Pianoputer ! A sound can b
Read the Transcript of Silk Road's Boss Ordering 5 Assassinations | WIRED
Many of the ideological supporters of the Silk Road have described its sprawling online black market for drugs as an experiment in victimles
Ghost in the Shell: Arise - Border 2: Ghost Whispers
Witness the formation of the legendary Public Security Section 9. When a clandestine organization hacks every car in the city, Kusanagi recr