Greg Sinclair

Greg Sinclair Email and Phone Number

Reverse Engineer (Mandiant) at Google @ Google
Mountain View, CA
Greg Sinclair's Location
United States, United States
Greg Sinclair's Contact Details
About Greg Sinclair

I am a reverse engineer who has spent the last decade and a half doing malware analysis. I have developed a variety of reverse engineering techniques and technologies that provide more comprehensive analysis of binaries (malicious and otherwise). My research and experience in binary analysis and reverse engineering has been critical in several malware interdiction efforts.I specialize in malware family tracking. Given a relatively small number of samples from a particular family of malware, I have demonstrated experience using open source intelligence to establish the lineage of a malware family and any adjacent families (typically found in APT contexts). Specialties: Reverse Engineering, Malware Analysis, Penetration Testing, Security Analysis, Software Development

Greg Sinclair's Current Company Details
Google

Google

View
Reverse Engineer (Mandiant) at Google
Mountain View, CA
Website:
google.com
Employees:
1
Company phone:
916.253.7820
Greg Sinclair Work Experience Details
  • Google
    Reverse Engineer (Mandiant)
    Google May 2020 - Present
    Mountain View, Ca, Us
  • Capital One
    Principle Reverse Engineer
    Capital One May 2016 - May 2020
    Mclean, Va, Us
  • Novetta
    Principal Reverse Engineer And Director Of Malware Research
    Novetta May 2014 - Mar 2016
    Mclean, Va, Us
    • Sole reverse engineer responsible for the analysis, classification, and correlation of the 47 different malware families found in Operation Blockbuster.• Primary reverse engineer for Operation SMN.• Reverse engineer malware samples (and families) in order to extract a detailed analysis of the malware’s capabilities.• Develop techniques and systems for propagating intelligence from one malware sample to multiple malware samples in a semi-automated fashion.• Develop techniques and applications for decoding network traffic for various malware families.• Develop code to extract configurations and other indicators of compromise (IOC) from malware families in an automated fashion.• Write highly technical reports detailing communication schemes, infection techniques and other key functionalities of malware samples.• Develop systems for the ingestion of up to hundreds of thousands of malware samples on a daily basis while capturing metadata and other IOC artifacts from each sample.• Work with industry partners to analyze and remediate large scale, global threats.• Provide subject matter expert level presentations to industry and government partners on active threats from both a technical and operational perspective. • Develop scalable systems for active network intelligence gathering of peer-to-peer botnet infrastructures.• Develop new reverse engineering techniques to streamline and advance Objective-C based binaries.• Construct high-fidelity YARA signatures for various malware families.
  • Capital One
    Principle Reverse Engineer
    Capital One 2016 - 2016
    Mclean, Va, Us
  • Verisign
    Advanced Threat Research Team (Malware Analysis)
    Verisign Mar 2008 - May 2014
    Reston, Virginia (Va), Us
    • Reverse engineered malicious code samples to provide customers with a complete understanding of the nature of the code.• Developed counter-intelligence platform for the observation of cyber-espionage operators in a contained, realistic virtual environment.• Wrote detailed reports of findings generated from reverse engineering malicious code samples and counter-intelligence operations.• Wrote monthly articles on various technical topics for iDefense publications.• Researched new technologies and trends associated with malicious code and malicious code analysis.• Developed new tools to aide in the analysis of malicious code.• Developed new, unifying techniques for reverse engineering binaries generated with varying compilers and languages (notably Visual-C++ and Delphi-based binaries).• Developed instrumentation for decoding and reconstructing C2 communication of operators from network captures.• Developed automation techniques for the automatic generation of intelligence summary reports.• Developed a system for the categorization of malware families based on metadata features of binaries of various types (executable, document, and scripts).• Developed a system for the evolutionary history of malware using automatic binary diffing techniques.• Provided ad hoc reverse engineering training to Verisign employees.
  • Hcsc
    It Security Research
    Hcsc Jun 2006 - Mar 2008
    Chicago, Il, Us
    • Lead research teams responsible for determining vulnerabilities in company technology resources.• Performed various risk assessment engagements.• Reverse engineered closed source binaries for x86 and PowerPC architectures to identify and exploit software vulnerabilities.• Performed extensive penetration tests against in-house technology resources.• Worked with external vendors to remediate software vulnerabilities found during a risk assessment engagement.• Developed strategies to remediate vulnerabilities in existing technologies deployed throughout the corporate infrastructure.• Performed the SAS 70 audit of all externally facing web services.• Reversed engineered Microsoft and Novell software patches to ensure they were compatible with the current infrastructure and to ensure the patches did not introduce additional risk.
  • Strayer University
    Head Of It Security
    Strayer University Oct 2003 - May 2006
    Washington, D.C., N.W., Us
    • Reported directly to the Chief Technology Officer on enterprise threats and remediation plans.• Developed the IT security department from scratch to establish a strong security presence for Strayer University.• Developed security assessments based on penetration testing, reconnaissance and network design implementation analysis.• Performed penetration tests on business partners to ensure safety of University data.• Developed security policies to formalize security best practices for all University employees.• Designed network infrastructure for campus and corporate locations that focus on security, reliability and redundancy.• Designed Active Directory infrastructure to improve security and reliability.• Coordinated the installation of enterprise network solutions including 100Meg WAN circuits, redundant network solutions and firewall solutions.• Developed network and server hardening best practices.• Developed infrastructure for WAN based VoIP solution.• Performed quarterly Internal Audits to ensure compliance with internal IT Policies.• Performed forensic analysis of intrusions and fraud cases.

Greg Sinclair Skills

Malware Analysis Penetration Testing Reverse Engineering Network Security Vulnerability Assessment Security Architecture Design Linux Python Encryption Tcp/ip Ceh C++ X86 Assembly Ida Ethical Hacking Unix Visual C++ Network Programming Antivirus C Network Architecture Programming Virtualization Shell Scripting Open Source Operating Systems Software Engineering Ida Pro Apt Counterintelligence

Greg Sinclair Education Details

  • University Of North Carolina At Charlotte
    University Of North Carolina At Charlotte
    Computer Science

Frequently Asked Questions about Greg Sinclair

What company does Greg Sinclair work for?

Greg Sinclair works for Google

What is Greg Sinclair's role at the current company?

Greg Sinclair's current role is Reverse Engineer (Mandiant) at Google.

What is Greg Sinclair's email address?

Greg Sinclair's email address is gs****@****are.com

What is Greg Sinclair's direct phone number?

Greg Sinclair's direct phone number is +157128*****

What schools did Greg Sinclair attend?

Greg Sinclair attended University Of North Carolina At Charlotte.

What skills is Greg Sinclair known for?

Greg Sinclair has skills like Malware Analysis, Penetration Testing, Reverse Engineering, Network Security, Vulnerability Assessment, Security Architecture Design, Linux, Python, Encryption, Tcp/ip, Ceh, C++.

Who are Greg Sinclair's colleagues?

Greg Sinclair's colleagues are Omar Torres, Samir Toro, Pa'seana N., Clint Chua, Danny Rozenblit, Olga Kozhemiachenko, Walter Anderson.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.