Luis R. Email and Phone Number
Luis R. work email
- Valid
Luis R. personal email
Luis R. is a Senior Principal Cybersecurity Strategist and Engineer at Sketch To Growth™️.
Sketch To Growth™️
View- Website:
- sketchtogrowth.com
- Employees:
- 8
-
Senior Principal Cybersecurity Strategist And EngineerSketch To Growth™️Washington, Dc, Us -
Senior Principal Cybersecurity Strategist & EngineerSketch To Growth™️ Aug 2024 - Present• Provide expert consulting services in incident response, disaster recovery, and cybersecurity policy development.• Support security engineering initiatives to strengthen architecture for evolving business needs through reference architecture design and testing.• Conduct software design reviews and secure code analysis to enhance security measures.• Provide support for business development activities, including resource management and proposal development, to align technical capabilities with client needs and drive organizational growth. -
Computer Scientist/Principal EngineerAllied Associates International 2021 - 2024Gainesville, Va, UsConduct advanced analysis to understand software data processing across various platforms and architectures, identifying vulnerabilities in both open and closed systems. Develop specialized software solutions, leveraging a wide range of tools and techniques to support security goals.Key responsibilities and achievements include:• Vulnerability Analysis and System Security Assessment: Performed in-depth vulnerability assessments of diverse systems, identifying and addressing security weaknesses in open and closed environments to enhance overall system resilience.• Software Solution Development: Developed specialized software solutions across multiple platforms, applying advanced techniques to address specific security requirements and operational needs.• Applied Research in Security and Memory Management: Conducted applied R&D in key areas including system memory management, security mechanisms, data encryption (both in transit and at rest), and proactive threat mitigation strategies, contributing to robust defense solutions.• Dynamic and Static Vulnerability Research: Engaged in both dynamic and static vulnerability research to uncover security flaws, supporting informed decision-making for effective remediation and mitigation strategies.• Security Software Prototype and Network Traffic Analysis: Designed and developed security software prototypes, utilizing network traffic analysis and embedded device assessments to create tools tailored to specific security scenarios.• Business Development and Proposal Support: Provided support for business development activities, including resource management and proposal development, to align technical capabilities with client needs and drive organizational growth. -
Technical Executive/Computer ScientistIc-1 Solutions (Sold To The Swift Group) 2018 - 2021Design and develop specialized software solutions, leveraging advanced tools and techniques to analyze data processing across multiple platforms; x86, x64, ARM and ARM64. Conduct comprehensive analysis of open and closed systems to identify vulnerabilities.Key responsibilities and achievements include:• Custom Software Development: Created specialized software in multiple languages and frameworks by reverse-engineering binaries, delivering tailored solutions to meet specific operational needs.• Exploit Mitigation and Bypass Research: Conducted applied research on exploit mitigation mechanisms and developed techniques to bypass these controls to enhance understanding of system security limits.• Cryptographic Research: Investigated symmetrical and asymmetrical encryption, certificate chains of trust, and cryptographic weaknesses to identify vulnerabilities within security protocols and strengthen defenses.• Protocol and Embedded Device Reverse Engineering: Reverse-engineered communication protocols and embedded devices, dissecting protocol structures and security elements, including checksums, MACs, and encoding formats, to uncover vulnerabilities and improve system resilience.• Vulnerability Analysis and Machine Learning: Applied dynamic and static vulnerability research, process memory space analysis, and machine learning techniques to detect security flaws and predict attack vectors, supporting proactive threat mitigation.• Security Software and Prototype Development: Designed and tested security software prototypes, applying insights from network traffic analysis, system forensics, and embedded device analysis to address specific mission requirements.• Business Development and Proposal Support: Contributed to business development and resource management, supporting proposal efforts by identifying opportunities, managing resources, and aligning technical expertise with client needs.
-
Computer Scientist/Principal EngineerAllied Associates International 2015 - 2018Gainesville, Va, UsConducted software reverse engineering across platforms, including x86, ARM, ARM64, and Android, using tools like IDA Pro, OllyDbg, and Immunity Debugger to analyze application functionality, control flows and security mechanisms.Key responsibilities and achievements include:• Vulnerability Research and Exploitation: Led R&D efforts to identify and exploit vulnerabilities such as memory corruption (e.g., buffer and heap overflows, integer overflows) and logical flaws. Investigated mitigation techniques (e.g., ASLR, stack cookies, non-executable memory) and researched methods to bypass these defenses.• File Format Analysis and Reverse Engineering: Performed in-depth reverse engineering on file formats, leveraging structural specifications, static analysis, and encoding techniques (e.g., Base64, ASN.1) to decode and interpret file data accurately.• Cryptography Research: Conducted research on symmetrical and asymmetrical encryption, certificate chains, and cryptographic weaknesses, enhancing understanding of crypto vulnerabilities and chain-of-trust mechanisms.• Protocol Analysis and Reverse Engineering: Reverse-engineered IP and serial-based protocols, dissecting inner workings such as checksums, MACs, encoding formats, and structures (e.g., HTTP, XML) to understand data transmission and security properties.• Custom Tool Development: Developed custom point solutions and tools using Python, C, and C++ to address specific analysis and automation needs in reverse engineering tasks.• Source Code Analysis and Vulnerability Identification: Analyzed source code across various languages to identify and mitigate potential vulnerabilities, reinforcing application security through proactive code assessment.• Cross-Platform and Virtualized Environment Proficiency: Worked with diverse operating systems and virtualized environments, leveraging technical versatility to optimize testing and analysis across varied platforms. -
Principal Cyber Engineer/Architect, Cyber Security SmeInforeliance 2014 - 2015Fairfax, Va, UsProvided expert consulting services in cybersecurity policy, engineering support, and operational guidance, bridging government and private sector service providers. Supported security engineering efforts to enhance architectures for ISPs and other commercial providers, building and testing reference architectures to validate security measures.Key responsibilities and achievements include:• Security Architecture and Engineering: Designed, built, and tested secure reference architectures, assessing and improving security controls for ISP and commercial service provider infrastructures. Led security assessments to evaluate control effectiveness against defined threat models.• Leadership in High-Impact Cybersecurity Initiatives: Led high-visibility cybersecurity teams, providing direction and expertise to deliver impactful results. Engaged executive and senior-level clients to identify needs, address challenges, develop requirements, and deliver actionable recommendations.• Lab Design and Prototype Development: Designed and deployed both unclassified and classified labs to support prototype testing, training development, and advanced data analytics, enabling a hands-on environment for testing and refining cybersecurity solutions.• Cybersecurity Training Development and Delivery: Developed and delivered tailored cybersecurity training, enhancing client teams’ skills and knowledge to strengthen security posture.• Blue, Red, and Purple Team Engagements: Contributed to blue, red, and purple team assessments, applying insights from real-world threat analysis to improve defensive strategies and support comprehensive security evaluations. -
Computer Scientist/Principal EngineerSix3 Systems (Acquired By Caci) 2013 - 2014Conducted advanced vulnerability research and malware analysis, isolating, reviewing, and reverse-engineering potentially malicious software from compromised systems and networks in support of intrusion investigations. Developed technical reports detailing the scope, characteristics, and impact of malware for both technical and non-technical audiences.Key responsibilities and achievements include:• Technical Analysis and Reporting: Analysis of malicious software, producing clear, detailed reports for distribution across various audiences. Developed proof-of-concept demonstrations to illustrate vulnerability and exploit feasibility when required.• Tool and Capability Development: Created specialized tools to support mission-specific requirements and enhance detection and response capabilities. Conducted research on emerging malware techniques, anti-analysis methods, and zero-day exploit trends to maintain a proactive defense posture.• Research and Subject Matter Expertise: Led in-depth research on advanced topics, including software vulnerabilities, command-and-control channels, exfiltration methods, evasion and anti-analysis techniques, protocol security, and federated systems exploitation. Developed targeted capabilities and solutions to address unique operational challenges.• Field and Operational Support: Provided technical expertise for field operations, offering rapid analysis and actionable insights in support of mission objectives.• Business Development (BD): Facilitated and supported BD meetings, building relationships with potential partners, and evaluating technology companies to align with current and future opportunities.• Team Leadership and Cross-Disciplinary Collaboration: Led Software and Network Engineering teams on Intelligence Community (IC) contracts. Collaborated closely with a skilled technical team specializing in areas such as embedded systems, wide-area and extraterrestrial communications, and radio networks.
-
Executive Business Solutions Architect/ Principal EngineerComputer Sciences Corporation (Csc) 2011 - 2013Delivered cybersecurity capabilities and solutions for Federal, DoD, and Intelligence Community engagements, ensuring compliance with standards such as DCID, ICD, NIST SP, FIPS, NSA Guides, and DoD IA STIGs.Key responsibilities and achievements include:• Compliance and Standards Alignment: Developed solutions and capabilities aligned with regulatory standards, meeting rigorous compliance requirements for federal, defense, and intelligence contracts.• Partnership and Vendor Management: Built and sustained strategic relationships with both large and small business partners for collaborative solution development. Evaluated vendor services for technical quality and talent suitability, ensuring alignment with organizational and mission requirements.• Solution Development and Productization: Authored white papers and developed packaged solutions for reuse in current and future engagements. Transformed cybersecurity capabilities into productized solutions, enhancing scalability and applicability across diverse projects.• Business Development Support: Contributed to business development, capture, and proposal efforts in key areas including security architecture, engineering, operations, governance, risk management, and cloud computing, positioning the organization for successful pursuits.• Classified Project Support: Provided specialized support for classified initiatives, applying cybersecurity expertise in high-stakes, sensitive environments. -
Senior Principal Engineer, Network/Software SecuritySrc 2009 - 2011North Syracuse, New York, UsLead member of the DHS-ICE Computer Security Response Team, embedded within the Security Operations Center (SOC). Developed key documents—ConOps, TTPs, SOPs, and Incident Analysis Series white papers—to strengthen collaboration between Cyber Intel and SOC/CSIRC. Created training materials and provided technical mentoring to team members.Key responsibilities and achievements include:• Process Coordination and Documentation: Monitored and documented processes to ensure consistent execution. Coordinated with government clients on prioritizing and scheduling requirements, supporting mission success and strategic alignment. Managed contractor personnel time reporting.• Advanced Malware Analysis: Performed in-depth malware analysis using HBGary Responder, Encase, IDA Pro, OllyDBG, WinDBG, Immunity, and other tools. Conducted packet analysis, tracebacks, code de-obfuscation, and advanced code analysis across multiple languages (PHP, JavaScript, Python, Visual Basic, .NET, C, C++, PERL, Java, x86/AT&T Assembly).• Incident Response and Security Operations: Assessed critical security events impacting the organization’s IT enterprise from OS and application perspectives. Led security monitoring, detection, scanning, auditing, analysis, investigation, reporting, remediation, coordination, and tracking activities across a global network environment.• Technology and Infrastructure Impact Analysis: Identified potential impacts of emerging technologies on infrastructure, providing actionable insights to stakeholders.• Leadership and Engineering Collaboration: Led engineering initiatives to develop communication infrastructure and specialized tools. Represented the engineering team in operational meetings, providing detailed updates on security and infrastructure advancements. -
Manager, Senior Security ArchitectBearingpoint (Filed Bankruptcy) 2007 - 2009Supported business development and managed customer relationships, ensuring alignment with customer expectations and mission objectives. Built and maintained strong relationships with major prime contractors, including Lockheed Martin, Northrop Grumman, Raytheon, CSC, SAIC, and IBM, to drive successful project execution and support customer mission success.Key responsibilities and achievements include:• Requirements Gathering and Validation: Collected and articulated security requirements for implementation teams, collaborating with key stakeholders to validate and verify their successful implementation.• Analysis and Stakeholder Engagement: Conducted in-depth analysis of business and technical artifacts related to each engagement and interviewed stakeholders to ensure comprehensive understanding of project requirements and objectives.• Architectural Analysis and Improvement: Identified architectural flaws in large-scale enterprise software systems, recommending and implementing strategic improvements aligned with the customer’s mission, vision, and strategic direction.• Research and Reporting: Researched emerging technologies and provided actionable recommendations to strengthen security posture. Developed detailed remediation reports outlining necessary actions to align security controls with industry best practices and regulatory standards.• Compliance and Standards Alignment: Ensured adherence to industry and government standards, including network engineering and software development best practices. Provided risk analysis for operational, architectural, and software components, offering mitigation and remediation strategies to minimize mission impact. Recommendations were based on compliance with FISMA, NIST SP series, FIPS series, and DISCAP standards.
-
Senior Security ConsultantCigital, Inc (A Part Of Synopsys) 2006 - 2007Dulles, Va, UsLed red teams in executing comprehensive software security assessments and translating technical findings into detailed reports with actionable mitigations. These assessments covered a range of enterprise web-based and thick-client applications.Key responsibilities and achievements include:• Infrastructure and Change Management: Developed in-depth technical understanding of the existing infrastructure and maintained awareness of ongoing and planned changes to optimize security assessment delivery.• Security Assessments: Conducted comprehensive risk assessments on large, mission-critical software systems, including application, architectural, and operational analyses. Engaged with key stakeholders, collecting quality and security metrics, performing architectural risk analysis, artifact analysis, secure code review, application penetration testing, and detailed risk mitigation planning.• Technical Analysis and Vulnerability Identification: Used a combination of commercial and open-source tools, alongside advanced techniques, to uncover vulnerabilities across a wide range of programming technologies, such as Java, ASP.NET, C#, JavaScript, C, and C++.• Gap Analysis and SDLC Review: Performed gap analyses on operational practices, such as the SDLC, to identify and address security risks, offering mitigation and remediation strategies to reduce business impact.• Testing and Strategic Awareness: Executed functional and security testing and maintained an awareness of industry and government strategic directions to align contract activities effectively.• Research and Reporting: Researched emerging technologies and provided actionable recommendations in white papers and comprehensive reports. Developed remediation reports detailing actions needed to align security controls with industry best practices and applicable regulations. -
Information Technology Security ArchitectWalt Disney World 2004 - 2006Lake Buena Vista, Florida, UsSupported business units across the organization in developing secure, scalable solutions with loosely coupled services to meet business process requirements and ensure compliance with external regulations through comprehensive security architecture design reviews.Key responsibilities and achievements include:• Security Design Reviews: Conducted security design reviews for IT projects ranging from $400k to $40 million, ensuring alignment with security best practices and regulatory standards. Leveraged project management practices and Life Cycle Methodologies (SDLC, CMMI, CMM) alongside COBIT best practices for effective project assessment.• Regulatory Compliance and Gap Analysis: Performed gap analyses on IT projects, measuring security design and existing posture against regulations such as HIPAA, GLBA, SOX, and PCI. Developed remediation reports with actionable recommendations to align security controls with industry best practices and regulatory requirements.• Enterprise Logging Solution Development: Played a key role in developing an enterprise logging solution compliant with PCI and SOX requirements, enhancing visibility and regulatory alignment across systems.• Security Baseline and Policy Development: Led initiatives to establish a Minimum Security Baseline for wireless technologies and provided ad-hoc security expertise to the team, including the interpretation of security assessment reports and findings.• Process Automation and PCI Compliance: Designed and implemented a security design review tool that automated the review process for PCI compliance, reducing review times from 3 months to just 3 hours, significantly improving operational efficiency and compliance speed. -
Director Of Information Security And Network Operations/Sr. Senior Research ScientistFlorida Institute Of Technology 1995 - 2004Melbourne, Florida, UsManaged a multi-million-dollar budget, leading and mentoring a team of 40 professionals and interns. Played an integral role on strategic committees, overseeing IT Planning, Instructional Technologies, Disaster Recovery, and Continuity Planning.Key responsibilities and achievements include:• Security and Policy Development: Established security policies, procedures, SOPs, and TTPs, enhancing organizational cybersecurity and resilience.• Network Architecture: Architected a 1,000+ node network for a new Engineering Building, opened in October 1999, to support high-performance needs.• System Administration and Monitoring: Administered a multi-OS environment, including Windows, UNIX systems (AIX, SGI, SCO, Linux, SUN OS), and research equipment. Configured and deployed server monitoring solutions and conducted system audits to maintain security and stability.• Incident Response and Forensics: As a member of the Computer Emergency Response Team (CERT), led forensic analyses, tracked malicious activities, and identified network anomalies. Configured and deployed IDS (Snort) and firewalls (CISCO PIX, SONICWALL, IP CHAINS) for threat detection and mitigation.• Research and Development in Security: Contributed to network and software security research, focusing on data analysis, packet analysis, honeypots, vulnerability identification, exploitation techniques, and malware analysis. Collaborated with public and private organizations to strengthen security practices.• Academic Contributions: Designed and taught a graduate-level course on practical network security, integrating open-source, commercial, and custom tools with practical methodologies and insights from field experience. -
Network Engineer Team LeadDigital Equipment Corporation (Usa) 1993 - 1995Maynard, Ma, UsNetwork Engineering Team Lead managing a complex network spanning five United Nations buildings, supporting diverse systems including Windows (3.x-95), Novell, Banyan Vines, OS2, and UNIX-based platforms (SGI, SCO, Sun, Linux, AIX). Ensured seamless cross-platform integration, security, and operational resilience.Key responsibilities and achievements include:• Cross-Platform Integration: Led integration efforts between Windows and UNIX systems to enable secure data sharing and interoperability, addressing compatibility challenges with tailored solutions for each environment.• Malware Mitigation and Incident Response: Managed malware response across the network using tools like Dr. Solomon’s and F-Prot. Coordinated containment efforts, system patching, and infection vector identification, protecting network integrity from frequent threats.• Data Recovery and Continuity: Provided data recovery using Norton Utilities, restoring essential data for high-priority users and ensuring continuity of operations. Established proactive protocols to minimize future data loss risks.• Team Leadership and Training: Led a team of technicians and network engineers, delivering guidance on best practices, troubleshooting, and operational procedures. Organized regular training sessions to enhance team expertise and technical skills.• Network Operations Management: Oversaw daily network operations, monitoring system health, managing resources, and coordinating with stakeholders across the United Nations buildings to address network needs promptly and efficiently.• Process Documentation and Improvement: Developed standardized procedures for incident response, malware mitigation, and cross-platform integration, streamlining team operations and reducing response time for common network issues.
Luis R. Education Details
-
Florida Institute Of TechnologyComputer Science -
George Mason UniversityInformation Technology -
Florida Institute Of TechnologyEngineering Management
Frequently Asked Questions about Luis R.
What company does Luis R. work for?
Luis R. works for Sketch To Growth™️
What is Luis R.'s role at the current company?
Luis R.'s current role is Senior Principal Cybersecurity Strategist and Engineer.
What is Luis R.'s email address?
Luis R.'s email address is lu****@****wth.com
What schools did Luis R. attend?
Luis R. attended Florida Institute Of Technology, George Mason University, Florida Institute Of Technology.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial