Steven Graf Email and Phone Number
Steven Graf work email
- Valid
- Valid
Steven Graf personal email
Accomplished Senior Security Researcher with a focus on integrating artificial intelligence to enhance mission outcomes. Expert in marrying formal coding standards with innovative technical methodologies to exceed customer expectations. Driven by a passion for developing cutting-edge solutions in the field of cybersecurity.
-
Network Security Engineer And SmeCaci International IncDenver, Co, Us -
Senior Data Scientist & Cybersecurity SmeCaci International Inc Jan 2015 - PresentReston, Virginia, Us* Utilized Generative AI: Performed prompt engineering to create custom AI chatbots to assist penetration testers with their engagements.* AI Assisted Development: Using AI to accelerate development and debugging activities.* Led internal improvement initiatives: Actively participated in working groups to enhance tradecraft, tool capabilities, and information flow within the organization.* Led Cybersecurity Projects: Spearheaded multiple R&D initiatives, developing concepts and project plans, and serving as the technical lead across diverse cybersecurity environments.* Developed software-defined radio capability with a custom RF stack: Designed and built a custom RF stack using commercially available SDRs to provide covert access.* Directed summer intern program: Develop job requirements, reviewed resumes and developed projects that accelerated intern learning in cybersecurity and improve the company’s cybersecurity capabilities for three years.* Investigated and reverse engineered IoT devices: Discovered undocumented hardware interfaces, analyzed network communications, and emulated firmware to find vulnerabilities.* Developed robust tools cybersecurity tools: Developed custom tools in Python and C# to automate standard workflow processes, improving efficiency and security measures.* Customer engagement and intelligence gathering: Regularly met with clients to collect intelligence requirements and provided updates on operational status.* Developed and executed red team mission plans: Routinely crafted and implemented strategies for various customers, focusing on advanced techniques such as lateral movement, protocol blending, and living-off-the-land to achieve mission objectives effectively.* Assisted in contract capture: Provided critical technical expertise to enhance several technical proposals, supporting successful contract acquisitions. -
Technical DirectorRingø Technologies Sep 2014 - Jul 2015* Analyzed client and server software components: Performed vulnerability assessments across multiple software platforms.* Conducted regular code reviews: Reviewed and improved C/C++ and Python code routines to enhance software reliability and security.* Researched and developed interception and persistence mechanisms: Created proof of concepts for various keyboard intercept and soft persistence techniques.* Developed robust software systems: Engineered portable systems targeting multiple versions of Windows using C/C++ and Windows DDK 7600.* Technical Lead for DARPA PLANX Program: Directed an empirical test range project for network defense simulations, coordinating technical and programmatic elements.* Worked with advanced virtualization technologies: Analyzed and utilized OpenStack/Mirantis, KVM hypervisor, and QEMU to enhance infrastructure capabilities.* Developed non-attributable network infrastructure: Engineered a complex network with both CONUS and OCONUS relay points for secure communications.* Identified and presented new business opportunities: Actively scouted and recommended potential projects to company leadership, enhancing business development efforts.* Assisted in proposal development: Contributed to the creation of technical and cost proposals, ensuring competitive and compelling submissions to clients.
-
President / Lead EngineerResolutech Apr 2013 - Dec 2014* Developed malware detection system for Android applications: Collaborated on a DARPA initiative focusing on enhancing security measures against malware in Android apps.* Customized Android operating system: Enhanced and extended hardware support within both the kernel and user-space through system modifications for a custom Android handset.* Utilized Java reflection: Accessed restricted and undocumented Android APIs to leverage advanced system features.* Conducted code analysis: Analyzed PHP websites to identify and address potential security vulnerabilities.* Developed automation frameworks: Streamlined fuzzing and product testing processes, increasing efficiency and effectiveness.* Extended compiler frameworks: Enhanced LLVM and Clang to introduce additional functionalities, improving compilation processes.* Implemented inline assembly: Developed support for MSVC intrinsics on x86 and AMD64 platforms, optimizing performance in both user and kernel spaces.* Audited Linux device drivers: Performed optimization reviews on Linux 2.6 device drivers to enhance system performance.* Conducted threat analysis and wireless surveys: Provided specialized threat assessment and wireless environment evaluations for commercial clients.* Led Network Traffic Analysis classes: Instructed advanced courses on network forensics and protocol reversing, enhancing participant capabilities in network security.
-
Senior Technical Operations OfficerMantech Jun 2011 - Apr 2013Herndon, Virginia, Us* Conducted red teaming assessments: Performed vulnerability assessments on internal critical systems to enhance security protocols.* Developed network sensors: Engineered systems to detect and alert on anomalous network activities, improving threat detection capabilities.* Executed MitM and MotS attacks: Utilized GreasySpoon and Burp Suite for detailed Man-in-the-Middle attacks to evaluate network security resilience.* Performed comprehensive network surveys: Used tools like nmap, smbclient, and custom Python scripts for in-depth network analysis and identification of key systems.* Collaborated with intelligence analysts: Supported understanding and countermeasures against advanced persistent threat (APT) tools, tactics, and practices.* Led internal improvement initiatives: Actively participated in working groups to enhance tradecraft, tool capabilities, and information flow within the organization.* Customer engagement and intelligence gathering: Regularly met with clients to collect intelligence requirements and provided updates on operational status. -
Senior Technical ManagerMantech Jan 2004 - Jun 2011Herndon, Virginia, Us* Program Management and Technical Leadership: Managed multiple classified cybersecurity programs from 2007 to 2010, overseeing a team of over 25 employees delivering advanced cyber capabilities. Achieved 100% award fee on all programs due to exemplary performance and results.* Implemented Development Best Practices: Instituted a rigorous code review process and acted as a senior code reviewer. Adopted Scrum methodologies, enhanced configuration management procedures, and refined source control practices using Subversion and Mercurial.* Established Coding and Testing Standards: Developed coding standards and role definitions, introducing key testing practices such as mocking and unit testing to ensure high-quality software development.* Software Development: Engineered robust systems in Python and C, including custom enhancements to an enterprise digital forensic platform.* Forensic Analysis and Scripting: Utilized Encase for media analysis and authored several scripts to automate common forensic tasks, enhancing efficiency and accuracy.* Customer Interaction and Requirements Gathering: Played a pivotal role in direct interactions with customers to gather requirements and troubleshoot issues with deployed tools, ensuring alignment with client needs and operational success.* Research and Development: Conducted light reverse engineering and vulnerability research, contributing to system security enhancements.* Protocol Analysis and Fuzzing: Replicated protocols to support the fuzzing of system services, improving software reliability and security.* Provided Technical Briefings: Routinely delivered briefings to key stakeholders including the COTR, branch chiefs, and deputy group chiefs, ensuring transparent communication and project alignment.* Led Business Capture Efforts: Successfully identified and pursued new opportunities, securing numerous contracts through strategic leadership and initiative.
Steven Graf Skills
Steven Graf Education Details
-
James Madison UniversityComputer Science
Frequently Asked Questions about Steven Graf
What company does Steven Graf work for?
Steven Graf works for Caci International Inc
What is Steven Graf's role at the current company?
Steven Graf's current role is Network Security Engineer and SME.
What is Steven Graf's email address?
Steven Graf's email address is sg****@****nss.com
What schools did Steven Graf attend?
Steven Graf attended James Madison University.
What are some of Steven Graf's interests?
Steven Graf has interest in Economic Empowerment, Environment, Science And Technology, Disaster And Humanitarian Relief, Animal Welfare.
What skills is Steven Graf known for?
Steven Graf has skills like Computer Security, Python, Linux, Network Security, Computer Forensics, Security, Vulnerability Assessment, Malware Analysis, Information Security, Software Development, Penetration Testing, Firewalls.
Who are Steven Graf's colleagues?
Steven Graf's colleagues are Alexander Yuen, Edward Stormer, Sean Beck, Eunice Defro, Lori Talley, John Yogore, Robert Berry.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial