Steven Graf

Steven Graf Email and Phone Number

Network Security Engineer and SME @ CACI International Inc
Denver, CO, US
Steven Graf's Location
Denver Metropolitan Area, United States, United States
Steven Graf's Contact Details

Steven Graf personal email

n/a
About Steven Graf

Accomplished Senior Security Researcher with a focus on integrating artificial intelligence to enhance mission outcomes. Expert in marrying formal coding standards with innovative technical methodologies to exceed customer expectations. Driven by a passion for developing cutting-edge solutions in the field of cybersecurity.

Steven Graf's Current Company Details
CACI International Inc

Caci International Inc

View
Network Security Engineer and SME
Denver, CO, US
Website:
caci.com
Employees:
21313
Steven Graf Work Experience Details
  • Caci International Inc
    Network Security Engineer And Sme
    Caci International Inc
    Denver, Co, Us
  • Caci International Inc
    Senior Data Scientist & Cybersecurity Sme
    Caci International Inc Jan 2015 - Present
    Reston, Virginia, Us
    * Utilized Generative AI: Performed prompt engineering to create custom AI chatbots to assist penetration testers with their engagements.* AI Assisted Development: Using AI to accelerate development and debugging activities.* Led internal improvement initiatives: Actively participated in working groups to enhance tradecraft, tool capabilities, and information flow within the organization.* Led Cybersecurity Projects: Spearheaded multiple R&D initiatives, developing concepts and project plans, and serving as the technical lead across diverse cybersecurity environments.* Developed software-defined radio capability with a custom RF stack: Designed and built a custom RF stack using commercially available SDRs to provide covert access.* Directed summer intern program: Develop job requirements, reviewed resumes and developed projects that accelerated intern learning in cybersecurity and improve the company’s cybersecurity capabilities for three years.* Investigated and reverse engineered IoT devices: Discovered undocumented hardware interfaces, analyzed network communications, and emulated firmware to find vulnerabilities.* Developed robust tools cybersecurity tools: Developed custom tools in Python and C# to automate standard workflow processes, improving efficiency and security measures.* Customer engagement and intelligence gathering: Regularly met with clients to collect intelligence requirements and provided updates on operational status.* Developed and executed red team mission plans: Routinely crafted and implemented strategies for various customers, focusing on advanced techniques such as lateral movement, protocol blending, and living-off-the-land to achieve mission objectives effectively.* Assisted in contract capture: Provided critical technical expertise to enhance several technical proposals, supporting successful contract acquisitions.
  • Ringø Technologies
    Technical Director
    Ringø Technologies Sep 2014 - Jul 2015
    * Analyzed client and server software components: Performed vulnerability assessments across multiple software platforms.* Conducted regular code reviews: Reviewed and improved C/C++ and Python code routines to enhance software reliability and security.* Researched and developed interception and persistence mechanisms: Created proof of concepts for various keyboard intercept and soft persistence techniques.* Developed robust software systems: Engineered portable systems targeting multiple versions of Windows using C/C++ and Windows DDK 7600.* Technical Lead for DARPA PLANX Program: Directed an empirical test range project for network defense simulations, coordinating technical and programmatic elements.* Worked with advanced virtualization technologies: Analyzed and utilized OpenStack/Mirantis, KVM hypervisor, and QEMU to enhance infrastructure capabilities.* Developed non-attributable network infrastructure: Engineered a complex network with both CONUS and OCONUS relay points for secure communications.* Identified and presented new business opportunities: Actively scouted and recommended potential projects to company leadership, enhancing business development efforts.* Assisted in proposal development: Contributed to the creation of technical and cost proposals, ensuring competitive and compelling submissions to clients.
  • Resolutech
    President / Lead Engineer
    Resolutech Apr 2013 - Dec 2014
    * Developed malware detection system for Android applications: Collaborated on a DARPA initiative focusing on enhancing security measures against malware in Android apps.* Customized Android operating system: Enhanced and extended hardware support within both the kernel and user-space through system modifications for a custom Android handset.* Utilized Java reflection: Accessed restricted and undocumented Android APIs to leverage advanced system features.* Conducted code analysis: Analyzed PHP websites to identify and address potential security vulnerabilities.* Developed automation frameworks: Streamlined fuzzing and product testing processes, increasing efficiency and effectiveness.* Extended compiler frameworks: Enhanced LLVM and Clang to introduce additional functionalities, improving compilation processes.* Implemented inline assembly: Developed support for MSVC intrinsics on x86 and AMD64 platforms, optimizing performance in both user and kernel spaces.* Audited Linux device drivers: Performed optimization reviews on Linux 2.6 device drivers to enhance system performance.* Conducted threat analysis and wireless surveys: Provided specialized threat assessment and wireless environment evaluations for commercial clients.* Led Network Traffic Analysis classes: Instructed advanced courses on network forensics and protocol reversing, enhancing participant capabilities in network security.
  • Mantech
    Senior Technical Operations Officer
    Mantech Jun 2011 - Apr 2013
    Herndon, Virginia, Us
    * Conducted red teaming assessments: Performed vulnerability assessments on internal critical systems to enhance security protocols.* Developed network sensors: Engineered systems to detect and alert on anomalous network activities, improving threat detection capabilities.* Executed MitM and MotS attacks: Utilized GreasySpoon and Burp Suite for detailed Man-in-the-Middle attacks to evaluate network security resilience.* Performed comprehensive network surveys: Used tools like nmap, smbclient, and custom Python scripts for in-depth network analysis and identification of key systems.* Collaborated with intelligence analysts: Supported understanding and countermeasures against advanced persistent threat (APT) tools, tactics, and practices.* Led internal improvement initiatives: Actively participated in working groups to enhance tradecraft, tool capabilities, and information flow within the organization.* Customer engagement and intelligence gathering: Regularly met with clients to collect intelligence requirements and provided updates on operational status.
  • Mantech
    Senior Technical Manager
    Mantech Jan 2004 - Jun 2011
    Herndon, Virginia, Us
    * Program Management and Technical Leadership: Managed multiple classified cybersecurity programs from 2007 to 2010, overseeing a team of over 25 employees delivering advanced cyber capabilities. Achieved 100% award fee on all programs due to exemplary performance and results.* Implemented Development Best Practices: Instituted a rigorous code review process and acted as a senior code reviewer. Adopted Scrum methodologies, enhanced configuration management procedures, and refined source control practices using Subversion and Mercurial.* Established Coding and Testing Standards: Developed coding standards and role definitions, introducing key testing practices such as mocking and unit testing to ensure high-quality software development.* Software Development: Engineered robust systems in Python and C, including custom enhancements to an enterprise digital forensic platform.* Forensic Analysis and Scripting: Utilized Encase for media analysis and authored several scripts to automate common forensic tasks, enhancing efficiency and accuracy.* Customer Interaction and Requirements Gathering: Played a pivotal role in direct interactions with customers to gather requirements and troubleshoot issues with deployed tools, ensuring alignment with client needs and operational success.* Research and Development: Conducted light reverse engineering and vulnerability research, contributing to system security enhancements.* Protocol Analysis and Fuzzing: Replicated protocols to support the fuzzing of system services, improving software reliability and security.* Provided Technical Briefings: Routinely delivered briefings to key stakeholders including the COTR, branch chiefs, and deputy group chiefs, ensuring transparent communication and project alignment.* Led Business Capture Efforts: Successfully identified and pursued new opportunities, securing numerous contracts through strategic leadership and initiative.

Steven Graf Skills

Computer Security Python Linux Network Security Computer Forensics Security Vulnerability Assessment Malware Analysis Information Security Software Development Penetration Testing Firewalls Vulnerability Research Intrusion Detection Operating Systems Subversion Networking Wireshark Tcp/ip Windows C# Microsoft Sql Server C Certified Scrum Master Csm Certified Scrum Product Owner Network Design C++ Language Computer Network Operations Exploitation Agile Methodologies Virtualization Vpn Android Mysql Dns Java Programming Microsoft Certified Solutions Developer Test Automation Vulnerability Management Ids Apache Open Source Pki Encase Linux System Administration Bash Security Architecture Design Iis Red Hat Linux

Steven Graf Education Details

  • James Madison University
    James Madison University
    Computer Science

Frequently Asked Questions about Steven Graf

What company does Steven Graf work for?

Steven Graf works for Caci International Inc

What is Steven Graf's role at the current company?

Steven Graf's current role is Network Security Engineer and SME.

What is Steven Graf's email address?

Steven Graf's email address is sg****@****nss.com

What schools did Steven Graf attend?

Steven Graf attended James Madison University.

What are some of Steven Graf's interests?

Steven Graf has interest in Economic Empowerment, Environment, Science And Technology, Disaster And Humanitarian Relief, Animal Welfare.

What skills is Steven Graf known for?

Steven Graf has skills like Computer Security, Python, Linux, Network Security, Computer Forensics, Security, Vulnerability Assessment, Malware Analysis, Information Security, Software Development, Penetration Testing, Firewalls.

Who are Steven Graf's colleagues?

Steven Graf's colleagues are Alexander Yuen, Edward Stormer, Sean Beck, Eunice Defro, Lori Talley, John Yogore, Robert Berry.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.