Ryan Farley Email and Phone Number
Ryan Farley work email
- Valid
- Valid
- Valid
Ryan Farley personal email
- Valid
Currently working cyber-crime intel and blockchain/digital asset analysis. Expertise in low-level OS and network security, particularly symbolic/dynamic binary analysis and DFIR. Enjoys strategizing research to create proof of concepts that lead to high-impact operational prototypes.- Researcher at the MITRE Corporation; previously at SRI International, IBM Research Zurich, and Wake Forest University; also start-ups: GreatWall Systems and BuddyGopher.- Academic metrics: 12 publications (7 proceedings, 2 journal, 1 book chapter, 1 dissertation, 1 thesis) since 2005, 6 conference presentations (1 best paper award), 3 invited seminar talks, and 1 patent.Keywords: network security, cyber, firewall, research, network infrastructure, c, c++, python, shellcode, malware, binary instrumentation, dynamic analysis, digital assets, cryptocurrency.
-
Principal Cyber Security Engineer: Project LeaderThe Mitre Corporation Sep 2014 - PresentMclean, Va, Us- Project Leader since 2019 for 10+ periods of performance: cyber-criminal investigative ops and capabilities, case linking/prioritization, darknet, and cryptocurrency/digital assets. Currently assist internal research (IR&D, aka MIP) as PI/co-PI for both research and transitions across multiple LEAs.- Previously technical & project-level leader in cyber operations and DFIR (digital forensics and incident response). Fan of Super Timelines. Previously PI for Internal R&D (aka MIP) around smart contract analysis, symbolic execution for RE, and secure information sharing. Also previously Group Leader, first line resource manager. Assisted early days of ATT&CK, designed custom proxy/dummy red-teaming tools for training purposes capable of emulating known TTP. Significant data pipeline architecture (and development) experience for integration, CI/CD, ETL, analyst focused UX, and report generation.- Multiple PRAs, Officer's, Director's, and other awards that I'm proud of. -
Adjunct ProfessorGeorge Mason University Jan 2016 - May 2016Fairfax, Virginia , Us- Refactored ISA 564 Security Laboratory, a MS/PhD course for hands-on exposure to security tools and topics.- Tied previously loosely connected techniques and topics into cohesive Cyber Kill Chain storyline.- Added lectures and labs on Windows shellcode and exploitation, 64b considerations, basic shellcode obfuscation, malware reverse engineering, dynamic and static analysis of binaries, C2 analysis, network signature creation, lateral movement, Powershell/WMI, APTs (nation-state vs crime vs hacktivism).- Integrated industry applicable tools: Git, assembly, and Python; as well as exposure to IDA Pro, OllyDBG, Kali, Armitage/Meterpreter/Metasploit, GCC/Makefiles, GDB, Scapy, Snort, and several others. -
Graduate Research AssistantGeorge Mason University Aug 2007 - Sep 2014Fairfax, Virginia , Us- Investigated methods for filtering and augmenting SIP traffic in order to protect end user under a NSF grant.- Developed exploits and defense mechanisms for VoIP software.- Researched privacy in mobile environments.- Developed, implemented, and published mobile device security tools that prevent audio bugging software from capturing microphone data.- Researched malware defense mechanism through binary injection and another sense of self.- Created a forensics binary extraction and observation tool called CodeXt based on symbolic analysis and emulation.Led to publications:- Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation.- VoIP shield: A Transparent Protection of Deployed VoIP Systems from SIP-based Exploits.- Roving Bugnet: Distributed Surveillance Threat and Mitigation (journal version).- Roving Bugnet: Distributed Surveillance Threat and Mitigation. - An Empirical Investigation into the Security of Phone Features in SIP-based VoIP Systems.- On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers.Led to press:- Paul Marks. "'Bugnets' Eavesdrop on You Wherever You Go." New Scientist issue 2743 (16 January 2010), p. 17. -
ResearcherSri International May 2010 - Aug 2010Menlo Park, Ca, Us- Worked in the Information Operations group. - Details restricted. -
Student ResearcherIbm Research Zurich Jan 2007 - Jun 2007Armonk, New York, Ny, Us- Investigated Snort IDS rule pattern optimization methods.- Gathered usage and construct statistics for future publications.- Project involved a parallel finite state machine pattern matching engine.- Developed software extensions for the project that supported importing patterns and inter-pattern relationships from the Snort rule set.- Assisted verification of engine integrity during expansion of pattern support. -
EngineerGreatwall Systems Jan 2006 - Dec 2006- Headed performance testing using SmartBits with high-speed network security technologies developed during thesis research. - Created a working demo prototype of the function-parallel design and the data-parallel design for a basis of comparison using OpenBSD.- Created testing suite for automation and control of the various systems under test using Perl, C, and bash scripting.- Investigated parallel IDS/IPS using Snort engine.- Served as a technical advisor to the board and met with potential investors.- Company successfully exited by sale to Centripetal Networks.
-
Research AssistantWake Forest University Jan 2004 - Dec 2005Winston-Salem, Nc, Us- Research with Dr. Errin Fulp sponsored by a U.S. Department of Energy grant.- Investigated methods for optimizing firewalls, security policies, and intrusion detection in high-speed networks.- Developed theory and tested implementations of distributed firewall architectures which were developed during undergraduate research.- Analyzed and presented research at flagship conferences.- Created theoretical groundwork for function-parallel rule distribution.- Developed discrete event simulator for modeling.- Created initial prototype from off the shelf components for experimental results.Led to patent:- Method, Systems, and Computer Program Products for Implementing Function-Parallel Network Firewall, U.S. Patent No. 8,037,517.Led to publications:- A Function-Parallel Architecture for High-Speed Firewalls.- Effects of Processing Delay on Function-Parallel Firewalls.- Parallel Firewall Designs for High-Speed Networks. -
Lead Software EngineerBuddygopher Apr 2003 - Dec 2004- Essentially Twitter for AOL Instant Messenger.- Internet startup used by over 12,000 people to aggregate data from over 500,000 user profiles.- Considered "extraordinarily prescient" by technology commentator Anil Dash.- Implemented and co-designed a user-friendly LAMP front-end and highly scalable parallel Perl/MySQL back-end to store and analyze data in real-time.- Data was used to determine trends and advertising strategies.- Created and administrated data-mining modules, security policies, database schema, DNS, and web server setup.Led to press:- Mary Beth Marklein. "Students Have 'Away' With Words." USA Today (29 March 2004), sec. D, p. 7.- Laura Sessions Stepp. "Posting Their Lives, Moment By Moment." Washington Post (9 July 2004), sec. C, pp. 1-2.- Sarah Mansell. "New Software Reveals Popularity of 'Away' Messages on College Campuses." Wake Forest University News Service (12 February 2004).
-
Business Computing Support Student ConsultantWake Forest University Feb 2000 - Mar 2003Winston-Salem, Nc, Us- Assigned as personal technology liaison to Associate Dean of the College.- Provided support and assistance to faculty, staff, and student users in person and over the phone.- Led restructuring of BCS website, designed templates, reduced space consumption by 25%. -
Network Services InternCollier County Public Schools May 1999 - Aug 1999Naples, Fl, Us- Maintained Token Ring and Ethernet infrastructure.- Managed Novell and NT servers.- Provided face-to-face general computing support.
Ryan Farley Skills
Ryan Farley Education Details
-
George Mason UniversityComputer Science -
Waseda UniversityJapanese -
Wake Forest UniversityComputer Science -
Wake Forest UniversityComputer Science
Frequently Asked Questions about Ryan Farley
What company does Ryan Farley work for?
Ryan Farley works for The Mitre Corporation
What is Ryan Farley's role at the current company?
Ryan Farley's current role is Principal Cyber Security Engineer at The MITRE Corporation.
What is Ryan Farley's email address?
Ryan Farley's email address is ry****@****ail.com
What schools did Ryan Farley attend?
Ryan Farley attended George Mason University, Waseda University, Wake Forest University, Wake Forest University.
What skills is Ryan Farley known for?
Ryan Farley has skills like Network Security, C++, Software Development, Distributed Systems, C, Shellcode, Binary Instrumentation, Python, Elasticsearch.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial