Jack Ward

Senior Vulnerability Researcher at Black Lantern Security
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
San Antonio, Texas, United States, US
Languages
  • Spanish Professional working proficiency
  • Portuguese Elementary proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 1 ratings
  • (1)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

📸 Mike Barrera 💡

Jack is an overall awesome guy. Professional. A pleasure to be around. A knowledgeable professional who truly knows the logistics of Cybersecurity and IT and how to implement the best practices of it into any organization he is part of.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • GIAC Certified Penetration Tester (GPEN)
    GIAC Certifications
    Apr, 2022
    - Nov, 2024
  • GIAC Reverse Engineering Malware (GREM)
    GIAC Certifications
    Jan, 2019
    - Nov, 2024

Experience

    • United States
    • Information Technology & Services
    • 1 - 100 Employee
    • Senior Vulnerability Researcher
      • May 2021 - Present

      Senior Vulnerability Researcher who creates tools and provides capabilities. Job Summary • Perform analysis on current threats and utilize intelligence gathered to create a scenario for Penetration Testers to perform testing to ensure an adequate defense of a network. • Create and improve the User Interfaces of tools, web-based controllers, and text-based programs. Roles performed • Senior Vulnerability Researcher • Senior Software Developer • Malware Reverse Engineer Achievements: • Assisted in the release of `dpkt 1.9.6` and provided release notes and feedback • Implemented the use of Salesforce's JA3 in the organization • Modified OpenSSL 1.1.1d to be more flexible and have more robust API. • Created a new website template using Flask, HTML, Python, Javascript, and Bootstrap • Live streamed the Reverse Engineering of CVE-2021-40444 • Participated in the "Any Port on the Net" podcast and spoke about Reverse Engineering Works with/on • Kernel, User Module, User Interface, Website, Network Development, OpenSSL (TLS/SSL) • Executables: Python, C, C++, C# • Web Development: Flask, Bootstrap, Python, JavaScript, HTML • Environments: Visual Studio Code, Visual Studio Debugger • Virtualization: Virtual Box, VMWare Workstation • Windows Clients/Servers (All major versions) • Linux Clients/Servers (All major versions) Administrative and Team Collaboration Tools • Agile, Kanban/Sprints, GitLab/GitHub • Microsoft Teams, Outlook, Discord Misc • Possesses Top Secret with Sensitive Compartmented Information (TS/SCI) Show less

    • United States
    • Software Development
    • 1 - 100 Employee
    • Cyber Capability Developer | Malware Reverse Engineer
      • Oct 2019 - Apr 2021

      Cyber Capability Developer focusing on enhancing native capabilities and providing new capability vectors using languages such as Python and C. Official Job Description (paraphrased): • Develop and analyze Computer Network Operations (CNO), Computer Network Defense (CND), Computer Network Exploitation (CNE), and Computer Network Attack (CNA) solutions as part of a high performance multi-disciplinary team in a fast-paced, dynamic environment. Roles performed: • Senior Cyber Capability Developer • Reverse Engineer of Malware Projects and Accomplishments: • Erected a complete Blue Team infrastructure for internal testing • Constructed complex Cyber Capabilities • Discovered vulnerabilities in x86 programs • Reverse Engineered malicious software • Created multiple kernel-mode programs • Designed clean graphical user interfaces for capabilities Works with/on: • x86 ASM, Python27, Python3, Java, Java Swing, C, C++ • PyCharm, Visual Studios/Code, Atom, Eclipse • WinDbg, GDB, ImmunityDbg, OllyDbg, x64dbg, Ida Pro, Ghidra • OpenStack, Proxmox, VMWare, ESXi • Windows Clients/Servers (All major versions) • Linux Clients/Servers (All major versions) Administrative and Team Collaboration Tools: • Agile, Kanban/Sprints, Atlassian (Jira/Confluence/Mattermost) • Git, GitHub, GitLab, Microsoft Teams, Discord, Slack, WebEx, Zoom • Deltek's Costpoint, ADP Payroll Awards, Courses and Certifications: • SAN FOR610 Reverse-Engineering Malware: Malware Analysis Tools and Techniques • GIAC Reverse Engineering Malware (GREM) Certification • Windows Apprentice • Windows Journeyman (pending) • CompTIA Linux+ (pending) Misc: • Possesses Top Secret with Sensitive Compartmented Information (TS/SCI) Show less

    • United States
    • Information Technology & Services
    • 1 - 100 Employee
    • Tech Lead | Malware Reverse Engineer | Software Developer
      • Sep 2018 - Sep 2019

      Tech Lead | Software Developer | Reverse Malware Engineer focusing on automation, analysis, and reverse engineering of malware and malicious files in support of Def-Logix clients. Official Job Description: • Builds high performance, reliable, scale-able, and secure code • Troubleshoots existing code bases, hunts down bugs, and streamlines code • Works and collaborates within an agile team • Engages with the customer/representative to fully understand the desired functionality • Writes and reviews technical documents Roles performed: - Tech Lead - Software Developer - Reverse Engineer of Malware - Contractor Security Supervisor Projects and Accomplishments: - Created a Reverse Engineering of Malware Environment called defREM XP - Assisted in the setting up of a local Cuckooo Sandbox and wrote custom signatures Works with/on: - Forensic and Reverse Engineer Distros: SIFT, Kali-Linux, Cuckoo, REMnux. Ghirdra - Debug Tools: x64bdg, Ida, scdbg, PeStudio, API Monitor, Process Monitor, etc - Windows Presentation Foundation (WPF), Universal Windows Platform (UWP) - XAML, C#, C++, C, Python, Assembly Code - Powershell Scripts, Dynamic Link Libraries (DLL), Microsoft Installers (MSI) - Visual Studios, PowerShell IDE - Windows Client/Servers Server - Ubuntu Clients/Servers, CentOS Clients/Servers, RedHat Clients/Servers - VMWare Horizon, vSphere, vCenter, VMWorkstation, Hyper-V - ELK Stack (ElasticSearch, Logstat, Kibana) Administrative and Team Collaboration Tools: - Agile, Kanban, Taiga, Jira, Confluence, Wikipedia - Git, GitHub, GitLab, Bitbucket, NextCloud, Dropbox - SpringAhead, NexTep, Rocketchat - Network Attached Storage (NAS), File Transfer (FTP) Servers Awards, Courses and Certifications: - SAN FOR610 Reverse-Engineering Malware: Malware Analysis Tools and Techniques - GIAC Reverse Engineering Malware (GREM) Certification Misc: - Possesses Top Secret with Sensitive Compartmented Information (TS/SCI) Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • First Sergeant and Operations Manager
      • Oct 2015 - Aug 2019

      Organized the monthly Battle Assemblies while serving as Operations Manager and Lead Trainer; lead many training events utilizing Bloom’s Taxonomy structure and speaking publicly to 75+ employees. Also trained non-cyber Soldiers on the basic network structure, defense postures, and attack vectors of a wireless network as well as conveyed the critical importance of the Army Cyber Command to non-technical personnel in national level positions of leadership. Effectively worked with the leadership, both local and leadership headquartered in Virginia, to ensure that all training, access requirements, and missions were completed on time. Show less

    • Brigade Military Intelligence Manager
      • Nov 2014 - Sep 2015

      In charge of the Intelligence Training and Professional Development of 300+ Military Intelligence Airborne Professionals and lead a 20 man Intelligence Analytical Cell that directly provided near-real time intelligence analysis and dissemination to key decision makers.Utilized Army Command and Control systems, to include: Distributed Common Ground System Army (DCGS-A), Force XXI Battle Command Brigade & Below - Joint Capabilities Release (FBCB2-JCR), and the Command Post of the Future (CPOF).Monitored and facilitated the use of Foundry Funds and performed duties as the Brigade Command Language Program Manager.Also served as Garrison G2 Sergeant Major for six months. Show less

    • Company Signal Intelligence Platoon Sergeant
      • Jan 2014 - Oct 2014

      Senior Signals Intelligence (SIGINT) Non-Commission Officer in charge of a 18-Soldier SIGINT Platoon maintaining and utilizing SIGINT Equipment such as; Prophet Sensor System, T-LITE Satellite Communication System, PRD-13, and the AOR-8200.Also served as First Sergeant of the Military Intelligence Company of 80 Military Intelligence Paratroopers for 8 weeks.

    • Special Operations Team - Alpha (SOT-A 7102) Team Sergeant
      • Jan 2010 - Jan 2014

      Lead a four man Special Operations Team (SOT-A) of specialized Signals Intelligence Soldiers performing Military Intelligence Collection missions in multiple Areas of Operations against unsophisticated and sophisticated communications.Utilized AOR8200, PRD-13, DRT-series, Harris SIGINT Terminal Guidance series, Assured-Pursuit/Next Generation Wireless series, and Sophisticated Network Engineer tools.Taught courses in Signal/Radio Wave propagation, HF/VHF/UHF theory, as well as GSM/CDMA/LTE/WiFi theory and structure.Colombia (1 tour, 4 months)Honduras - Operation Blue Shield (1 tour, 4 months)Afghanistan - OEF XIX (1 tour, 9 months) Show less

    • Flight Standardization Instructor and Mission Supervisor
      • Apr 2005 - Dec 2009

      Served as Flight Standardization Instructor and Mission Supervisor of 30+ Non-Rated Crew Member.Performed multiple Aerial Recon and Signals Collection operations.Colombia (9 tours, 24 months)

  • Strykersoft
    • San Antonio, Texas Area
    • Founder and Senior Developer
      • Oct 2015 - Aug 2018

      Strykersoft is a small startup company that focuses on developing mobile applications. Current mobile applications: - Tower Defense (Android Phone & Tablet, iPhone & iPad, Windows Universal) https://youtu.be/AOfylt-lvRA Past mobile applications: - Stryker's APFT Calculator (Windows Mobile) https://youtu.be/rj1q2l2gzos - 907 Gamers (Windows Mobile) https://youtu.be/5_ObGrtHNLc - Stopwatch2k2 (Windows Mobile) Strykersoft is a small startup company that focuses on developing mobile applications. Current mobile applications: - Tower Defense (Android Phone & Tablet, iPhone & iPad, Windows Universal) https://youtu.be/AOfylt-lvRA Past mobile applications: - Stryker's APFT Calculator (Windows Mobile) https://youtu.be/rj1q2l2gzos - 907 Gamers (Windows Mobile) https://youtu.be/5_ObGrtHNLc - Stopwatch2k2 (Windows Mobile)

    • United States
    • Higher Education
    • 700 & Above Employee
    • Cyber Security Student
      • Jan 2016 - Dec 2017

      Study and participate in Cyber Security studies within UTSA's College of Business. Studies include; Network Security, Application Programming (C, C++, C#, Java), Network Penetration, and Information Assurance. An active participant in the Cyber Security Association's (CSA) Red Team as a Windows Penetration Tester and CSA's Blue Team on the Windows Security Team. I utilize all Windows Operating Systems (from Win95 to Win10, including Windows Server 2008 and 2012) and many Linux systems (Ubuntu, Kali, Backtrack, Debian, FreeBSD, Fedora, etc). Expected graduation in December 2019, with the possibility to graduate later due to Army Reserve requirements during the summer session(s). Very Proficient with Virtualization Software (VMWare, Proxmox, Hyper-V), Network Detection Tool (Wireshark, Snort), and Network Intrusion and Penetration Tools (Kali 2.0, Metasploit). Show less

Education

  • SANS Technology Institute
    Cyber Security
    2018 - 2023
  • PluralSight
    Programming, Analysis, and Reverse Engineering of Malware, 4.0
    2015 - 2022
  • SANS Technology Institute
    GIAC Reverse Engineering Malware (GREM) Certification, Forensics 610: Reverse Engineering of Malware
    2018 - 2019
  • Udacity
    Android Development, 4.0
    2016 - 2018
  • Microsoft Virtual Academy / Microsoft Learn
    Universal Windows Platform (UMP), 4.0
    2015 - 2018
  • The University of Texas at San Antonio
    Cyber Security, 4.0
    2016 - 2017
  • Cochise College
    Military Intelligence, General, 4.0
    2009 - 2016
  • Defense Language Institute
    Associate of Arts (A.A.), Spanish Language and Literature
    2003 - 2005
  • Judson High School
    1998 - 2002

Community

You need to have a working account to view this content. Click here to join now