Greg Sinclair Email and Phone Number
Greg Sinclair work email
- Valid
- Valid
- Valid
- Valid
- Valid
Greg Sinclair personal email
Greg Sinclair phone numbers
I am a reverse engineer who has spent the last decade and a half doing malware analysis. I have developed a variety of reverse engineering techniques and technologies that provide more comprehensive analysis of binaries (malicious and otherwise). My research and experience in binary analysis and reverse engineering has been critical in several malware interdiction efforts.I specialize in malware family tracking. Given a relatively small number of samples from a particular family of malware, I have demonstrated experience using open source intelligence to establish the lineage of a malware family and any adjacent families (typically found in APT contexts). Specialties: Reverse Engineering, Malware Analysis, Penetration Testing, Security Analysis, Software Development
- Website:
- google.com
- Employees:
- 1
- Company phone:
- 916.253.7820
-
Reverse Engineer (Mandiant)Google May 2020 - PresentMountain View, Ca, Us -
Principle Reverse EngineerCapital One May 2016 - May 2020Mclean, Va, Us -
Principal Reverse Engineer And Director Of Malware ResearchNovetta May 2014 - Mar 2016Mclean, Va, Us• Sole reverse engineer responsible for the analysis, classification, and correlation of the 47 different malware families found in Operation Blockbuster.• Primary reverse engineer for Operation SMN.• Reverse engineer malware samples (and families) in order to extract a detailed analysis of the malware’s capabilities.• Develop techniques and systems for propagating intelligence from one malware sample to multiple malware samples in a semi-automated fashion.• Develop techniques and applications for decoding network traffic for various malware families.• Develop code to extract configurations and other indicators of compromise (IOC) from malware families in an automated fashion.• Write highly technical reports detailing communication schemes, infection techniques and other key functionalities of malware samples.• Develop systems for the ingestion of up to hundreds of thousands of malware samples on a daily basis while capturing metadata and other IOC artifacts from each sample.• Work with industry partners to analyze and remediate large scale, global threats.• Provide subject matter expert level presentations to industry and government partners on active threats from both a technical and operational perspective. • Develop scalable systems for active network intelligence gathering of peer-to-peer botnet infrastructures.• Develop new reverse engineering techniques to streamline and advance Objective-C based binaries.• Construct high-fidelity YARA signatures for various malware families. -
Principle Reverse EngineerCapital One 2016 - 2016Mclean, Va, Us -
Advanced Threat Research Team (Malware Analysis)Verisign Mar 2008 - May 2014Reston, Virginia (Va), Us• Reverse engineered malicious code samples to provide customers with a complete understanding of the nature of the code.• Developed counter-intelligence platform for the observation of cyber-espionage operators in a contained, realistic virtual environment.• Wrote detailed reports of findings generated from reverse engineering malicious code samples and counter-intelligence operations.• Wrote monthly articles on various technical topics for iDefense publications.• Researched new technologies and trends associated with malicious code and malicious code analysis.• Developed new tools to aide in the analysis of malicious code.• Developed new, unifying techniques for reverse engineering binaries generated with varying compilers and languages (notably Visual-C++ and Delphi-based binaries).• Developed instrumentation for decoding and reconstructing C2 communication of operators from network captures.• Developed automation techniques for the automatic generation of intelligence summary reports.• Developed a system for the categorization of malware families based on metadata features of binaries of various types (executable, document, and scripts).• Developed a system for the evolutionary history of malware using automatic binary diffing techniques.• Provided ad hoc reverse engineering training to Verisign employees. -
It Security ResearchHcsc Jun 2006 - Mar 2008Chicago, Il, Us• Lead research teams responsible for determining vulnerabilities in company technology resources.• Performed various risk assessment engagements.• Reverse engineered closed source binaries for x86 and PowerPC architectures to identify and exploit software vulnerabilities.• Performed extensive penetration tests against in-house technology resources.• Worked with external vendors to remediate software vulnerabilities found during a risk assessment engagement.• Developed strategies to remediate vulnerabilities in existing technologies deployed throughout the corporate infrastructure.• Performed the SAS 70 audit of all externally facing web services.• Reversed engineered Microsoft and Novell software patches to ensure they were compatible with the current infrastructure and to ensure the patches did not introduce additional risk. -
Head Of It SecurityStrayer University Oct 2003 - May 2006Washington, D.C., N.W., Us• Reported directly to the Chief Technology Officer on enterprise threats and remediation plans.• Developed the IT security department from scratch to establish a strong security presence for Strayer University.• Developed security assessments based on penetration testing, reconnaissance and network design implementation analysis.• Performed penetration tests on business partners to ensure safety of University data.• Developed security policies to formalize security best practices for all University employees.• Designed network infrastructure for campus and corporate locations that focus on security, reliability and redundancy.• Designed Active Directory infrastructure to improve security and reliability.• Coordinated the installation of enterprise network solutions including 100Meg WAN circuits, redundant network solutions and firewall solutions.• Developed network and server hardening best practices.• Developed infrastructure for WAN based VoIP solution.• Performed quarterly Internal Audits to ensure compliance with internal IT Policies.• Performed forensic analysis of intrusions and fraud cases.
Greg Sinclair Skills
Greg Sinclair Education Details
-
University Of North Carolina At CharlotteComputer Science
Frequently Asked Questions about Greg Sinclair
What company does Greg Sinclair work for?
Greg Sinclair works for Google
What is Greg Sinclair's role at the current company?
Greg Sinclair's current role is Reverse Engineer (Mandiant) at Google.
What is Greg Sinclair's email address?
Greg Sinclair's email address is gs****@****are.com
What is Greg Sinclair's direct phone number?
Greg Sinclair's direct phone number is +157128*****
What schools did Greg Sinclair attend?
Greg Sinclair attended University Of North Carolina At Charlotte.
What skills is Greg Sinclair known for?
Greg Sinclair has skills like Malware Analysis, Penetration Testing, Reverse Engineering, Network Security, Vulnerability Assessment, Security Architecture Design, Linux, Python, Encryption, Tcp/ip, Ceh, C++.
Who are Greg Sinclair's colleagues?
Greg Sinclair's colleagues are Omar Torres, Samir Toro, Pa'seana N., Clint Chua, Danny Rozenblit, Olga Kozhemiachenko, Walter Anderson.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial