Luis R.

Luis R. Email and Phone Number

Senior Principal Cybersecurity Strategist and Engineer @ Sketch To Growth™️
Washington, DC, US
Luis R.'s Location
Washington DC-Baltimore Area, United States, United States
Luis R.'s Contact Details

Luis R. work email

Luis R. personal email

n/a
About Luis R.

Luis R. is a Senior Principal Cybersecurity Strategist and Engineer at Sketch To Growth™️.

Luis R.'s Current Company Details
Sketch To Growth™️

Sketch To Growth™️

View
Senior Principal Cybersecurity Strategist and Engineer
Washington, DC, US
Employees:
8
Luis R. Work Experience Details
  • Sketch To Growth™️
    Senior Principal Cybersecurity Strategist And Engineer
    Sketch To Growth™️
    Washington, Dc, Us
  • Sketch To Growth™️
    Senior Principal Cybersecurity Strategist & Engineer
    Sketch To Growth™️ Aug 2024 - Present
    • Provide expert consulting services in incident response, disaster recovery, and cybersecurity policy development.• Support security engineering initiatives to strengthen architecture for evolving business needs through reference architecture design and testing.• Conduct software design reviews and secure code analysis to enhance security measures.• Provide support for business development activities, including resource management and proposal development, to align technical capabilities with client needs and drive organizational growth.
  • Allied Associates International
    Computer Scientist/Principal Engineer
    Allied Associates International 2021 - 2024
    Gainesville, Va, Us
    Conduct advanced analysis to understand software data processing across various platforms and architectures, identifying vulnerabilities in both open and closed systems. Develop specialized software solutions, leveraging a wide range of tools and techniques to support security goals.Key responsibilities and achievements include:• Vulnerability Analysis and System Security Assessment: Performed in-depth vulnerability assessments of diverse systems, identifying and addressing security weaknesses in open and closed environments to enhance overall system resilience.• Software Solution Development: Developed specialized software solutions across multiple platforms, applying advanced techniques to address specific security requirements and operational needs.• Applied Research in Security and Memory Management: Conducted applied R&D in key areas including system memory management, security mechanisms, data encryption (both in transit and at rest), and proactive threat mitigation strategies, contributing to robust defense solutions.• Dynamic and Static Vulnerability Research: Engaged in both dynamic and static vulnerability research to uncover security flaws, supporting informed decision-making for effective remediation and mitigation strategies.• Security Software Prototype and Network Traffic Analysis: Designed and developed security software prototypes, utilizing network traffic analysis and embedded device assessments to create tools tailored to specific security scenarios.• Business Development and Proposal Support: Provided support for business development activities, including resource management and proposal development, to align technical capabilities with client needs and drive organizational growth.
  • Ic-1 Solutions (Sold To The Swift Group)
    Technical Executive/Computer Scientist
    Ic-1 Solutions (Sold To The Swift Group) 2018 - 2021
    Design and develop specialized software solutions, leveraging advanced tools and techniques to analyze data processing across multiple platforms; x86, x64, ARM and ARM64. Conduct comprehensive analysis of open and closed systems to identify vulnerabilities.Key responsibilities and achievements include:• Custom Software Development: Created specialized software in multiple languages and frameworks by reverse-engineering binaries, delivering tailored solutions to meet specific operational needs.• Exploit Mitigation and Bypass Research: Conducted applied research on exploit mitigation mechanisms and developed techniques to bypass these controls to enhance understanding of system security limits.• Cryptographic Research: Investigated symmetrical and asymmetrical encryption, certificate chains of trust, and cryptographic weaknesses to identify vulnerabilities within security protocols and strengthen defenses.• Protocol and Embedded Device Reverse Engineering: Reverse-engineered communication protocols and embedded devices, dissecting protocol structures and security elements, including checksums, MACs, and encoding formats, to uncover vulnerabilities and improve system resilience.• Vulnerability Analysis and Machine Learning: Applied dynamic and static vulnerability research, process memory space analysis, and machine learning techniques to detect security flaws and predict attack vectors, supporting proactive threat mitigation.• Security Software and Prototype Development: Designed and tested security software prototypes, applying insights from network traffic analysis, system forensics, and embedded device analysis to address specific mission requirements.• Business Development and Proposal Support: Contributed to business development and resource management, supporting proposal efforts by identifying opportunities, managing resources, and aligning technical expertise with client needs.
  • Allied Associates International
    Computer Scientist/Principal Engineer
    Allied Associates International 2015 - 2018
    Gainesville, Va, Us
    Conducted software reverse engineering across platforms, including x86, ARM, ARM64, and Android, using tools like IDA Pro, OllyDbg, and Immunity Debugger to analyze application functionality, control flows and security mechanisms.Key responsibilities and achievements include:• Vulnerability Research and Exploitation: Led R&D efforts to identify and exploit vulnerabilities such as memory corruption (e.g., buffer and heap overflows, integer overflows) and logical flaws. Investigated mitigation techniques (e.g., ASLR, stack cookies, non-executable memory) and researched methods to bypass these defenses.• File Format Analysis and Reverse Engineering: Performed in-depth reverse engineering on file formats, leveraging structural specifications, static analysis, and encoding techniques (e.g., Base64, ASN.1) to decode and interpret file data accurately.• Cryptography Research: Conducted research on symmetrical and asymmetrical encryption, certificate chains, and cryptographic weaknesses, enhancing understanding of crypto vulnerabilities and chain-of-trust mechanisms.• Protocol Analysis and Reverse Engineering: Reverse-engineered IP and serial-based protocols, dissecting inner workings such as checksums, MACs, encoding formats, and structures (e.g., HTTP, XML) to understand data transmission and security properties.• Custom Tool Development: Developed custom point solutions and tools using Python, C, and C++ to address specific analysis and automation needs in reverse engineering tasks.• Source Code Analysis and Vulnerability Identification: Analyzed source code across various languages to identify and mitigate potential vulnerabilities, reinforcing application security through proactive code assessment.• Cross-Platform and Virtualized Environment Proficiency: Worked with diverse operating systems and virtualized environments, leveraging technical versatility to optimize testing and analysis across varied platforms.
  • Inforeliance
    Principal Cyber Engineer/Architect, Cyber Security Sme
    Inforeliance 2014 - 2015
    Fairfax, Va, Us
    Provided expert consulting services in cybersecurity policy, engineering support, and operational guidance, bridging government and private sector service providers. Supported security engineering efforts to enhance architectures for ISPs and other commercial providers, building and testing reference architectures to validate security measures.Key responsibilities and achievements include:• Security Architecture and Engineering: Designed, built, and tested secure reference architectures, assessing and improving security controls for ISP and commercial service provider infrastructures. Led security assessments to evaluate control effectiveness against defined threat models.• Leadership in High-Impact Cybersecurity Initiatives: Led high-visibility cybersecurity teams, providing direction and expertise to deliver impactful results. Engaged executive and senior-level clients to identify needs, address challenges, develop requirements, and deliver actionable recommendations.• Lab Design and Prototype Development: Designed and deployed both unclassified and classified labs to support prototype testing, training development, and advanced data analytics, enabling a hands-on environment for testing and refining cybersecurity solutions.• Cybersecurity Training Development and Delivery: Developed and delivered tailored cybersecurity training, enhancing client teams’ skills and knowledge to strengthen security posture.• Blue, Red, and Purple Team Engagements: Contributed to blue, red, and purple team assessments, applying insights from real-world threat analysis to improve defensive strategies and support comprehensive security evaluations.
  • Six3 Systems (Acquired By Caci)
    Computer Scientist/Principal Engineer
    Six3 Systems (Acquired By Caci) 2013 - 2014
    Conducted advanced vulnerability research and malware analysis, isolating, reviewing, and reverse-engineering potentially malicious software from compromised systems and networks in support of intrusion investigations. Developed technical reports detailing the scope, characteristics, and impact of malware for both technical and non-technical audiences.Key responsibilities and achievements include:• Technical Analysis and Reporting: Analysis of malicious software, producing clear, detailed reports for distribution across various audiences. Developed proof-of-concept demonstrations to illustrate vulnerability and exploit feasibility when required.• Tool and Capability Development: Created specialized tools to support mission-specific requirements and enhance detection and response capabilities. Conducted research on emerging malware techniques, anti-analysis methods, and zero-day exploit trends to maintain a proactive defense posture.• Research and Subject Matter Expertise: Led in-depth research on advanced topics, including software vulnerabilities, command-and-control channels, exfiltration methods, evasion and anti-analysis techniques, protocol security, and federated systems exploitation. Developed targeted capabilities and solutions to address unique operational challenges.• Field and Operational Support: Provided technical expertise for field operations, offering rapid analysis and actionable insights in support of mission objectives.• Business Development (BD): Facilitated and supported BD meetings, building relationships with potential partners, and evaluating technology companies to align with current and future opportunities.• Team Leadership and Cross-Disciplinary Collaboration: Led Software and Network Engineering teams on Intelligence Community (IC) contracts. Collaborated closely with a skilled technical team specializing in areas such as embedded systems, wide-area and extraterrestrial communications, and radio networks.
  • Computer Sciences Corporation (Csc)
    Executive Business Solutions Architect/ Principal Engineer
    Computer Sciences Corporation (Csc) 2011 - 2013
    Delivered cybersecurity capabilities and solutions for Federal, DoD, and Intelligence Community engagements, ensuring compliance with standards such as DCID, ICD, NIST SP, FIPS, NSA Guides, and DoD IA STIGs.Key responsibilities and achievements include:• Compliance and Standards Alignment: Developed solutions and capabilities aligned with regulatory standards, meeting rigorous compliance requirements for federal, defense, and intelligence contracts.• Partnership and Vendor Management: Built and sustained strategic relationships with both large and small business partners for collaborative solution development. Evaluated vendor services for technical quality and talent suitability, ensuring alignment with organizational and mission requirements.• Solution Development and Productization: Authored white papers and developed packaged solutions for reuse in current and future engagements. Transformed cybersecurity capabilities into productized solutions, enhancing scalability and applicability across diverse projects.• Business Development Support: Contributed to business development, capture, and proposal efforts in key areas including security architecture, engineering, operations, governance, risk management, and cloud computing, positioning the organization for successful pursuits.• Classified Project Support: Provided specialized support for classified initiatives, applying cybersecurity expertise in high-stakes, sensitive environments.
  • Src
    Senior Principal Engineer, Network/Software Security
    Src 2009 - 2011
    North Syracuse, New York, Us
    Lead member of the DHS-ICE Computer Security Response Team, embedded within the Security Operations Center (SOC). Developed key documents—ConOps, TTPs, SOPs, and Incident Analysis Series white papers—to strengthen collaboration between Cyber Intel and SOC/CSIRC. Created training materials and provided technical mentoring to team members.Key responsibilities and achievements include:• Process Coordination and Documentation: Monitored and documented processes to ensure consistent execution. Coordinated with government clients on prioritizing and scheduling requirements, supporting mission success and strategic alignment. Managed contractor personnel time reporting.• Advanced Malware Analysis: Performed in-depth malware analysis using HBGary Responder, Encase, IDA Pro, OllyDBG, WinDBG, Immunity, and other tools. Conducted packet analysis, tracebacks, code de-obfuscation, and advanced code analysis across multiple languages (PHP, JavaScript, Python, Visual Basic, .NET, C, C++, PERL, Java, x86/AT&T Assembly).• Incident Response and Security Operations: Assessed critical security events impacting the organization’s IT enterprise from OS and application perspectives. Led security monitoring, detection, scanning, auditing, analysis, investigation, reporting, remediation, coordination, and tracking activities across a global network environment.• Technology and Infrastructure Impact Analysis: Identified potential impacts of emerging technologies on infrastructure, providing actionable insights to stakeholders.• Leadership and Engineering Collaboration: Led engineering initiatives to develop communication infrastructure and specialized tools. Represented the engineering team in operational meetings, providing detailed updates on security and infrastructure advancements.
  • Bearingpoint (Filed Bankruptcy)
    Manager, Senior Security Architect
    Bearingpoint (Filed Bankruptcy) 2007 - 2009
    Supported business development and managed customer relationships, ensuring alignment with customer expectations and mission objectives. Built and maintained strong relationships with major prime contractors, including Lockheed Martin, Northrop Grumman, Raytheon, CSC, SAIC, and IBM, to drive successful project execution and support customer mission success.Key responsibilities and achievements include:• Requirements Gathering and Validation: Collected and articulated security requirements for implementation teams, collaborating with key stakeholders to validate and verify their successful implementation.• Analysis and Stakeholder Engagement: Conducted in-depth analysis of business and technical artifacts related to each engagement and interviewed stakeholders to ensure comprehensive understanding of project requirements and objectives.• Architectural Analysis and Improvement: Identified architectural flaws in large-scale enterprise software systems, recommending and implementing strategic improvements aligned with the customer’s mission, vision, and strategic direction.• Research and Reporting: Researched emerging technologies and provided actionable recommendations to strengthen security posture. Developed detailed remediation reports outlining necessary actions to align security controls with industry best practices and regulatory standards.• Compliance and Standards Alignment: Ensured adherence to industry and government standards, including network engineering and software development best practices. Provided risk analysis for operational, architectural, and software components, offering mitigation and remediation strategies to minimize mission impact. Recommendations were based on compliance with FISMA, NIST SP series, FIPS series, and DISCAP standards.
  • Cigital, Inc (A Part Of Synopsys)
    Senior Security Consultant
    Cigital, Inc (A Part Of Synopsys) 2006 - 2007
    Dulles, Va, Us
    Led red teams in executing comprehensive software security assessments and translating technical findings into detailed reports with actionable mitigations. These assessments covered a range of enterprise web-based and thick-client applications.Key responsibilities and achievements include:• Infrastructure and Change Management: Developed in-depth technical understanding of the existing infrastructure and maintained awareness of ongoing and planned changes to optimize security assessment delivery.• Security Assessments: Conducted comprehensive risk assessments on large, mission-critical software systems, including application, architectural, and operational analyses. Engaged with key stakeholders, collecting quality and security metrics, performing architectural risk analysis, artifact analysis, secure code review, application penetration testing, and detailed risk mitigation planning.• Technical Analysis and Vulnerability Identification: Used a combination of commercial and open-source tools, alongside advanced techniques, to uncover vulnerabilities across a wide range of programming technologies, such as Java, ASP.NET, C#, JavaScript, C, and C++.• Gap Analysis and SDLC Review: Performed gap analyses on operational practices, such as the SDLC, to identify and address security risks, offering mitigation and remediation strategies to reduce business impact.• Testing and Strategic Awareness: Executed functional and security testing and maintained an awareness of industry and government strategic directions to align contract activities effectively.• Research and Reporting: Researched emerging technologies and provided actionable recommendations in white papers and comprehensive reports. Developed remediation reports detailing actions needed to align security controls with industry best practices and applicable regulations.
  • Walt Disney World
    Information Technology Security Architect
    Walt Disney World 2004 - 2006
    Lake Buena Vista, Florida, Us
    Supported business units across the organization in developing secure, scalable solutions with loosely coupled services to meet business process requirements and ensure compliance with external regulations through comprehensive security architecture design reviews.Key responsibilities and achievements include:• Security Design Reviews: Conducted security design reviews for IT projects ranging from $400k to $40 million, ensuring alignment with security best practices and regulatory standards. Leveraged project management practices and Life Cycle Methodologies (SDLC, CMMI, CMM) alongside COBIT best practices for effective project assessment.• Regulatory Compliance and Gap Analysis: Performed gap analyses on IT projects, measuring security design and existing posture against regulations such as HIPAA, GLBA, SOX, and PCI. Developed remediation reports with actionable recommendations to align security controls with industry best practices and regulatory requirements.• Enterprise Logging Solution Development: Played a key role in developing an enterprise logging solution compliant with PCI and SOX requirements, enhancing visibility and regulatory alignment across systems.• Security Baseline and Policy Development: Led initiatives to establish a Minimum Security Baseline for wireless technologies and provided ad-hoc security expertise to the team, including the interpretation of security assessment reports and findings.• Process Automation and PCI Compliance: Designed and implemented a security design review tool that automated the review process for PCI compliance, reducing review times from 3 months to just 3 hours, significantly improving operational efficiency and compliance speed.
  • Florida Institute Of Technology
    Director Of Information Security And Network Operations/Sr. Senior Research Scientist
    Florida Institute Of Technology 1995 - 2004
    Melbourne, Florida, Us
    Managed a multi-million-dollar budget, leading and mentoring a team of 40 professionals and interns. Played an integral role on strategic committees, overseeing IT Planning, Instructional Technologies, Disaster Recovery, and Continuity Planning.Key responsibilities and achievements include:• Security and Policy Development: Established security policies, procedures, SOPs, and TTPs, enhancing organizational cybersecurity and resilience.• Network Architecture: Architected a 1,000+ node network for a new Engineering Building, opened in October 1999, to support high-performance needs.• System Administration and Monitoring: Administered a multi-OS environment, including Windows, UNIX systems (AIX, SGI, SCO, Linux, SUN OS), and research equipment. Configured and deployed server monitoring solutions and conducted system audits to maintain security and stability.• Incident Response and Forensics: As a member of the Computer Emergency Response Team (CERT), led forensic analyses, tracked malicious activities, and identified network anomalies. Configured and deployed IDS (Snort) and firewalls (CISCO PIX, SONICWALL, IP CHAINS) for threat detection and mitigation.• Research and Development in Security: Contributed to network and software security research, focusing on data analysis, packet analysis, honeypots, vulnerability identification, exploitation techniques, and malware analysis. Collaborated with public and private organizations to strengthen security practices.• Academic Contributions: Designed and taught a graduate-level course on practical network security, integrating open-source, commercial, and custom tools with practical methodologies and insights from field experience.
  • Digital Equipment Corporation (Usa)
    Network Engineer Team Lead
    Digital Equipment Corporation (Usa) 1993 - 1995
    Maynard, Ma, Us
    Network Engineering Team Lead managing a complex network spanning five United Nations buildings, supporting diverse systems including Windows (3.x-95), Novell, Banyan Vines, OS2, and UNIX-based platforms (SGI, SCO, Sun, Linux, AIX). Ensured seamless cross-platform integration, security, and operational resilience.Key responsibilities and achievements include:• Cross-Platform Integration: Led integration efforts between Windows and UNIX systems to enable secure data sharing and interoperability, addressing compatibility challenges with tailored solutions for each environment.• Malware Mitigation and Incident Response: Managed malware response across the network using tools like Dr. Solomon’s and F-Prot. Coordinated containment efforts, system patching, and infection vector identification, protecting network integrity from frequent threats.• Data Recovery and Continuity: Provided data recovery using Norton Utilities, restoring essential data for high-priority users and ensuring continuity of operations. Established proactive protocols to minimize future data loss risks.• Team Leadership and Training: Led a team of technicians and network engineers, delivering guidance on best practices, troubleshooting, and operational procedures. Organized regular training sessions to enhance team expertise and technical skills.• Network Operations Management: Oversaw daily network operations, monitoring system health, managing resources, and coordinating with stakeholders across the United Nations buildings to address network needs promptly and efficiently.• Process Documentation and Improvement: Developed standardized procedures for incident response, malware mitigation, and cross-platform integration, streamlining team operations and reducing response time for common network issues.

Luis R. Education Details

  • Florida Institute Of Technology
    Florida Institute Of Technology
    Computer Science
  • George Mason University
    George Mason University
    Information Technology
  • Florida Institute Of Technology
    Florida Institute Of Technology
    Engineering Management

Frequently Asked Questions about Luis R.

What company does Luis R. work for?

Luis R. works for Sketch To Growth™️

What is Luis R.'s role at the current company?

Luis R.'s current role is Senior Principal Cybersecurity Strategist and Engineer.

What is Luis R.'s email address?

Luis R.'s email address is lu****@****wth.com

What schools did Luis R. attend?

Luis R. attended Florida Institute Of Technology, George Mason University, Florida Institute Of Technology.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.